A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Arora, Sandeep Kumar
- Improvement in Data Packet Routing on the basis of Stability
Authors
1 Department of Electronics and Communication Engineering, Lovely Professional University, Jalandhar - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 3 (2016), Pagination:Abstract
Mobile Adhoc Network (MANET) consists of various independent nodes that work on wireless topology; so better Quality of Services (QoS) is required in these networks which can be achieved by selecting the optimal path. The selection of the optimal path between nodes is a fundamental issue that arisesin Mobile Ad hoc Network (MANETs). In order to reduce the latency, Packet Delivery Ratio (PDR) and overhead, certain methods are advocated that improves the route efficiency by selection of the most stable path. The proposed work suggests a method where header node in each network is selected and the path with highest average sum of header number is elected as the optimal path. The study was conducted to analyze the performance of technique over existing techniques which revealed that the throughput of the system has been increased by a factor of 2 along with the increase of Packet delivery Ratio by 45.53%.Keywords
Black Hole Attack, Link Failure, Maliciousnode, Packet Delivery Ratio, Throughput- Performance of D-LAR on the basis of Average Hop Count in VANET
Authors
1 Department of Electronics and Communication Engineering, Lovely Professional University, Jalandhar - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 20 (2016), Pagination:Abstract
VANET (Vehicular Ad Hoc Network) can perform vast number of applications like active safety, create warning messages by wireless vehicular communications without using fixed infra-structure. Due to VANET characteristics such as dynamic nature, repeated fragmentation and continuously changes in network topologies, performance of routing algorithms can be a challenging task. Thus, greedy based approach provides the most suitable solutions for routing in VANET. In this paper, D-LAR (Directional Location Aided) protocol performance is discussed which will give us more accurate location of moving vehicles as compared to the other location aided protocols on the basis of average hop count.Keywords
Hop Count, Probability, Routing Protocols, VANET (Vehicular Ad Hoc Network).- Combined Approach for the Analysis of Black Hole and Worm Hole Attack in MANET
Authors
1 Department of Electronics and Communication Engineering, Lovely Professional University, Phagwara - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 20 (2016), Pagination:Abstract
MANET is vulnerable to most of the security threats and we proposed a combined approach which is used to detect both the black hole and worm hole attack. We also carried out black hole and worm hole attack on MANET using Ad hoc On Demand Distance Vector (AODV) routing protocol and analyzed the performance parameters like Throughput, Packet Delivery Ratio(PDR) and Normalized Routing Load (NRL). After implementation of proposed technique, we found that the parameters for Quality of Services (QoS) in MANET improved significantly as compare to conventional techniques.Keywords
AODV, IDS, Mobile Ad hoc Network, PDR, Routing Protocols, Quality of Services.- Electronic Wheelchair for Physically Disabled Persons
Authors
1 Discipline of Electronics and Electrical Engineering, Lovely Professional University, Jalandhar - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 21 (2016), Pagination:Abstract
This paper highlights various physical disorders and its associated disabilities. Plenty of wheel chair have been designed so far. A wheel chair which can assist the disabled people in their day to day life became a necessity. It is possible if their other organs of the body assist the electronic gadgets. Proposed method helps the physically challenged people to make their journey through electronic assisted module which works on signal processing over speech and image. This system works via speech or through recognition of hand gesture. To overcome the loss of signal because of real time inputs, different signal enhancement techniques are introduced to achieve high rate of accuracy and stability. The system's response time is very much considerable as the delays of the system are quite reduced. The operating system created to work on gestures and speech was tested on the test bed with different sets of data. Results marked prominent impression over the conventional ones with accuracy rate of 84.66% in case of image processing and 82.33% in speech signal processing.The refinement of the electronic wheelchair is going to definitely help many suffering from the disease.Keywords
Disability, Electronic Wheelchair, Feature Extraction, Motion Detection, Signal Enhancement.- Detection of Sink Hole Attacks in MANET
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 2 (2014), Pagination:Abstract
A mobile ad-hoc network (MANET) is most popular example of wireless mobile communication. This network set up by the collection of multi-hop and self-configured mobile nodes without any network infrastructure. Topology of these network changes rapidly and unpredictably. Since mobile nodes are communicating with each other and willing to forward packets to other nodes in the network. These types of networks are more vulnerable to various security threats. One of the major security attacks in MANET is denial of service (DoS) attack. This paper concentrates on the study of the effects of two types of DoS attacks, namely Gray hole attack and Black hole attack in MANET using the reactive routing protocol and also provide the solution to black hole attack. All experiments are simulated for Gray Hole attacks, for black hole attack and for a solution under a variety of ad hoc network conditions such as throughput, packet deliveryratio and normalized routing load inorder to understand the severity of this attack. All simulation is done by network simulator (NS-2).