SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
22
“Reducing Packet Loss in MANET”
1
Shalini Sharma, 2
Proff. Mr. Hitesh Gupta,3
Proff. Mr. Pankaj Kawadkar
1
Shalini Sharma,M.tech(IV th Sem),PIT, Bhopal,shalu_vash@yahoo.co.in
2
Proff. Mr. Hitesh Gupta, Dept. Of Computer Science & Eng. PCST Bhopal,gupta_hitesh@sify.com
3
Proff. Mr. Pankaj Kawadkar,Dept. of Computer Science & Eng. PIES Bhopal,kawadkarpankaj@gmail.com
Abstract
Dynamic topology and infrastructure less behaviour provide a great facility for adhoc network. Such facility
generates easy connection of adhoc network and provides node mobility without loss of connection. In such
ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network
suffered some serious security therats such attacks are black hole attack, malicious attack and worm hole attack
that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet
dropping various authors built various method such method is node authentication, passive feedback scheme,
ack-based scheme,reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of
massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the requested
node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure
channel for overcoming the problem of decision ambiguity for requested node, improved node authentication
and minimize packet dropping in adhoc network.
Keywords- mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach,
network security.
I. Introduction
Adhoc network is a group collection of mobile node. During the last few years we have all witnessed steadily
increasing growth in the deployment of wireless mobile communication networks. Mobile ad hoc networks
consist of
nodes that are able to communicate through the use of wireless mediums and form dynamic topologies. The
basic characteristic of these networks is the complete lack of any kind of infrastructure, and therefore the
absence of dedicated nodes that provide network management operations as do the traditional routers in fixed
networks. In order to maintain connectivity in a mobile ad hoc network all participating nodes have to perform
routing of network traffic. The cooperation of nodes cannot be enforced by a centralized administration authority
since one does not exist. Therefore, a network-layer protocol designed for such self-organized networks must
enforce connectivity and security requirements in order to guarantee the undisrupted operation of the higher
layer protocols. Unfortunately all of the widely used ad hoc routing protocols have no security considerations
and trust all the participants to correctly forward routing and data traffic. Figure
Fig.1 Shows that scenario of ad-hoc network
The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons:
firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active
interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security
mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities
which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy
algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being
compromised and then being used by adversary to launch attacks on networks.
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
23
MANET stands for Mobile Ad- hoc Network.It infrastructureless wireless network. A MANET can be formed
either by mobile nodes or by both fixed and mobile nodes. Nodes randomly associate with each other forming
arbitrary topologies. They act as both routers and hosts. The ability of mobile routers to self-configure makes this
technology suitable for provisioning communication to, for instance, disaster-hit areas where there is no
communication infrastructure, conferences, or in emergency search and rescue operations where a network
connection is urgently required. The need for mobility in wireless networks necessitated the formation of the
MANET working group within The Internet Engineering Task Force (IETF) for developing consistent IP routing
protocols for both static and dynamic topologies.
Figure : 2
Start
Nodes send signal to find the number of other nodes within range
Synchronizing between nodes
Sender node send messages to receiving node
receiving node ready
Communication begins
Termination Process
Stop
Receiving node
Send back
Ready signal
Is Wait for
sometime
NoYes
Figure : 3
There are five main security services for MANETs: authentication, confidentiality, integrity, non-
repudiation,availability. Authentication means that correct identity is known to communicating partner;
Confidentiality means certain message information is kept secure from unauthorized party; integrity means
message is unaltered during the communication; no repudiation means the origin of a message cannot deny
having sent the message availability means the normal service provision in face of all kinds of attacks. Among
all the security services, authentication is probably the most complex and important issue in MANETs since it is
the bootstrap of the whole security system. Without knowing exactly who you are talking with, it is worthless to
protect your data from being read or altered. Once authentication is achieved in MANET, confidentiality is a
matter of encrypting the session using whatever key material the communicating parties agree on. Note that these
security services may be provided singly or in combination. In security concern node authentication scheme is
better option for secured communication in mobile adhoc network.The most efficient node authentication is
ACK-Based scheme.The ACK-Based scheme provides a node authentication security in adhoc network. But this
scheme generates a huge amount of packet load in network; the generated packet generates a packet dropping in
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
24
network. The generation of huge amount of wastes the bandwidth of network and performance of network
decreases.
II. Routing protocol in wireless ad hoc network
A. Routing Concept
Routing is the act of moving information from source to a destination in an internet work. During this process, at
least one intermediate node within the internetwork is encountered.
The routing concept basically involves two activities: firstly, determining optimal paths and secondly, transferring
the information groups (called packets) through an internetwork. The latter concept is called as packet switching,
which is straight forward, and path determination is very complex. Routing protocol uses several matrices to
calculate the best path for the routing the packet to its destination. These matrices are a standard measurement that
could be number of hops, which is used by the routing algorithm to determine the optimal path for the packet to its
destination. The process of path determination is that, routing algorithms initialize and maintain routing tables,
which contain the total route information for packet. This route information varies form one routing algorithm to
another. Routing tables are filled with a variety of information which is generated by routing algorithms. Most
common entries in the routing table are ip-address prefix and the next hop. Routing tables Destination/next hop
associations tell the router that a particular destination can be reached optimally by sending the packet to router
representing the "next hop" on its way to final destination and ip-address prefix specifies a set of destinations for
which the routing entry is valid for.
In mobile ad-hoc network every node is having routing capability. Nodes are within the radio range (transmission-
range) are called its Neighbors. When the destination node is neighbor of source node, packets are transferred with
single hop. When the destination node is neighbor of source node, packets are transferred with single hop. When
the destination node is out of radio-range (not a neighbors of source node) then packet are transferred in multiple
hops using intermediate nodes. These intermediate nodes (neighbors of source node) forward packets to their
neighbors and so on till destination is reached. This is shown below:
Figure 4(a) : Single hop transfer when S & D in a radio range
Figure 4 (b): Multiple hops when S & D are not in redio range
III. ACK-based schemes
S
D
S
D
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
25
ACK based scheme overcome the limitation of passive-feedback technique when power control transmission is
used. To implement this scheme, an authentication mechanism is used to prevent the next hop from sending a
forged ACK packet on behalf of the intended two hop neighbor.
The main drawback of this scheme is the huge
overhead. In order to reduce the overhead, the authors have proposed that each node asks its two hop neighbor
to send back an ACK randomly rather than continuously. Likewise, this extension also fails when the two hop
neighbor refuses to send back an ACK. In such situation, the requester node is unable to distinguish who is the
malicious node, its next hop or the requested node. To overcome the previous ambiguity in determining the true
malicious node, focuses on detecting malicious links instead of malicious nodes.This scheme is based on 2ACK
packet that is assigned a fixed route of two hops in the opposite direction of the received data traffic’s route. In
this scheme, each packet’s sender maintains the following parameters; (i) list of identifiers of data packets that
have been sent out but have not been acknowledged yet, (ii) a counter of the forwarded data packets, (iii) and a
counter of the missed packets.
IV. Modified ACK-based scheme
In the existing ack-based scheme uses 2ack process for the node authentication process in attack scenario in ad-
hoc network. These 2ack based scheme generate a huge amount of ack packet in the network and also give
decision ambiguity for requested node and then effect quality of service .now we modified these scheme used
finite state automata. Finite state automate provide a state of route ack, due to this node ack packet maintain state
between node to request and respond node. In this process we used some extra buffered memory for maintain a
state of node .that memory area maintain a path state due to given request and response. For maintaining a
request packet acknowledgment we calculate the next hop with dsdv protocol concept. Path state maintains a
sequence of ack packet.
V. Simulation parameter & simulation result: simulation setup
Table I
Simulation used NS-2.34
Topology area 1200 X 1200
No. of Mobile Nodes 25
Max. No. of Connection 30
Simulation Time 200
Speed 10-20 m/sec
Communication Link
Capacity
10 Mbps
Traffic Intensity 45,85,95,180
Routing Protocol AODV
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
26
In order to simulate the scenarios described above, the implementation was done in NS-2.34 Network Simulator.
The simulation scenario to simulate MANET, which uses AODV without packet drop and with packet drop are
given in table.
results:
This set contains result of comparisons of Graph b/w Throughput with secure channel and without secure
channel, Average E- E Delay, Packet Delivery Ratio and Avg. Jitter and Routing Load in Ad Hoc network.
Comparison b/w packet delivery ratio between with secure channel without secure channel
Figure 5: Effect on PDR using secure channel in mobile adhoc network
The result shows both the cases, with the secure channel and without the secure channel it is measured that the
packet delivery ratio is dramatically decreases when the network are not using secure channel. Hence, for better
delivery of packet a secure channel is must in the network.
Comparison b/w throughput with
secure channel without secure channel
Figure 6: Effect on throughput using secure channel in mobile adhoc network
This result shows that throughput of the network with secure channel is greater as compared to the throughput of
the network without containing secure channel. Decease in throughput indicates that the resources are not
utilized in the most efficient manner, it also points out that the available resources can be utilized in a more
efficient manner. Clearly it shows that without using secure channel in a network has detrimental effect on
throughput.
Comparison b/w Routing load with secure channel without secure channel
Figure 7: Effect on Routing Load using secure channel in mobile adhoc network
This result also shows that, routing load increases without using secure channel as compared to the network
using secure channel. Due to this, if the network does not use secure channel then the overhead and traffic load
or congestion increases. So the network must use secure channel.
VI. Conclusion & Recommendation
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
27
Without infrastructure and node mobility in adhoc network is a great challenge in security concern. For security
concern various method are proposed for node authentication in mobile adhoc network. The authentication
scheme of leader agent and member surveillance greatly reduces the relative calculating overheads and
communication costs. Generally speaking, when leader agent node and surveillance nodes are not destroyed, the
united nodes can ensure the reliability, the authentication result is reliable. The dissertation proposes a novel
scheme for migrating packet dropping in mobile adhoc network. Our proposed method uses secure channel to
overcome the decision ambiguity in requested node and node authentication. In this dissertation secure channel
maintain a state of request and reply such fashion minimize packet overhead in network.Our proposed method
also removes the node ambiguity in 2ACK hop for authentication process. And minimize a packet dropping in
mobile adhoc network Our proposed mechanism has overcome some of the limitations like it has the required
some extra buffer memory for maintain a state of request/reply automata. It also introduces little bit
computational overhead during route advertisement and path establishment.
References:
SHRADDHA RAUT, SD CHEDE: “Detection and Removal of Black hole in Mobile Ad-hoc Network
[1]. (MANET)”, International Journal of Electrical and Electronics Engineering (IJEEE), ISSN (PRINT): 2231
– 5284 Vol-1 Iss-4, 2012.
[2]. Satyendra Tiwari, Anurag Jain and Gajendra Singh Chowhan: “Migrating Packet Dropping in Adhoc
Network Based on Modified ACKbased Scheme Using FSA” International Journal on Emerging
Technologies 2(2): 102-105(2011).
[3]. Kejun Liu, Jing Deng: “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in
MANETs”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5, MAY 2007.
[4]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto: “A Dynamic Anomaly
Detection Scheme for AODV-Based Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON
VEHICULAR TECHNOLOGY, VOL. 58, NO. 5, JUNE 2009.
[5]. Zonghua Zhang, Farid Na¨ıt-Abdesselam Pin-Han Ho, Xiaodong Lin:” RADAR: a ReputAtion-based
Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks”, 1525-3511/08©2008 IEEE
[6]. Soufine Djahel Farid Na, ıt-Abdesselam and Ashfaq Khokhar:” An Acknowledgment-Based Scheme to
Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol”, 978-1-4244-
2075-9/08©2008 IEEE.
[7]. Zhengming Li and Chunxiao Chigan Danniel Wong: “AWF-NA: A Complete Solution for Tampered
Packet Detection in VANETs” 978-1-4244-2324-8/08©2008 IEEE.
[8]. Z. Wang, C. Chigan, “Countermeasure uncooperative behaviors with dynamic Trust-Token in VANETs”,
in Proc. of IEEE International Conference on Communications (ICC 2007), pp.3959 – 3964, June 2007.
[9]. S. Buchegger and J. Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes:
fairness in dynamic adhoc networks),” in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking
and Computing (MoBiHOC). June 2002
[10]. [11].S. Marti, T. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in
Proc. of MOBICOM, 2000.
[11]. http://www.ietf.org/rfc/rfc2501.txt. date last viewed: 2008-12-31.
[12].T. S. Rappaport, “Wireless Comunication: Principles and Practice”, Parentice-Hall, 1996.
[13].Zhijiang Chang, Georgi Gayadadjiev, Stamatis Vassiliadis, “Routing Protocols for Mobile Ad-hoc
Newtorks: Current Development and Evaluation”.
[14].M.O. Rabin. Digitalized signatures and public key functions as intractable as factorization. Technical
Report No. 212, MIT Laboratory of Computer Science, MIT/LCS/TR-212, 1979.
[15]. G. Gaubatz, J.P. Kaps, and B. Sunar, “Public key cryptography in sensor networks-revisited”. In 1st
European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004.
[16].R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, Theory of spread spectrum communications: a tutorial.
IEEE Transactions on Communications, 20(5):855.884, May 1982.
[17].Mr. Ankur Khetrapal, “ Routing techniques for Mobile Ad Hoc Newtorks Classification and
Qualitative/Quantitative Analysis”.
[18].Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa: “Ad Hoc Mobile Wireless Network: Principles,
Protocols and Applications”
[19].S. Murphy, J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM
Mobile Networks and Applications Journal, pages 183-197, Nov.1996.
http://citeseer.nj.nec.com/10238.html
Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.6, 2013
28
[20].Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar,Bhavin I. Shah: “ MANET Routing Protocols and
Wormhole Attack against AODV” IJCSNS International Journal of Computer Science and Network
Security, VOL.10 No.4, April 2010.
[21].C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel" Proc. IEEE
SICON'97, Apr.1997, pp.197-211.
[22].C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks"
IEEE Journal on Selected Areas in Communications, Special Issue on Ad-H, IOC: Networks, Aug 1999,
pp.1369-79.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Was ist angesagt?

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 

Was ist angesagt? (16)

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
E42043640
E42043640E42043640
E42043640
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 

Andere mochten auch

A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 

Andere mochten auch (7)

Manet ns2
Manet ns2Manet ns2
Manet ns2
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 

Ähnlich wie “Reducing packet loss in manet”

Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd Iaetsd
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 

Ähnlich wie “Reducing packet loss in manet” (20)

Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Aodv
AodvAodv
Aodv
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
E0942531
E0942531E0942531
E0942531
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
ant2
ant2ant2
ant2
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
N0363079085
N0363079085N0363079085
N0363079085
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 

Mehr von Alexander Decker

A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceAlexander Decker
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
 

Mehr von Alexander Decker (20)

A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 
A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...A study to evaluate the attitude of faculty members of public universities of...
A study to evaluate the attitude of faculty members of public universities of...
 
A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...A study to assess the knowledge regarding prevention of pneumonia among middl...
A study to assess the knowledge regarding prevention of pneumonia among middl...
 
A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...A study regarding analyzing recessionary impact on fundamental determinants o...
A study regarding analyzing recessionary impact on fundamental determinants o...
 
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...A study on would be urban-migrants’ needs and necessities in rural bangladesh...
A study on would be urban-migrants’ needs and necessities in rural bangladesh...
 
A study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among scienceA study on the evaluation of scientific creativity among science
A study on the evaluation of scientific creativity among science
 
A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.A study on the antioxidant defense system in breast cancer patients.
A study on the antioxidant defense system in breast cancer patients.
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

“Reducing packet loss in manet”

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 22 “Reducing Packet Loss in MANET” 1 Shalini Sharma, 2 Proff. Mr. Hitesh Gupta,3 Proff. Mr. Pankaj Kawadkar 1 Shalini Sharma,M.tech(IV th Sem),PIT, Bhopal,shalu_vash@yahoo.co.in 2 Proff. Mr. Hitesh Gupta, Dept. Of Computer Science & Eng. PCST Bhopal,gupta_hitesh@sify.com 3 Proff. Mr. Pankaj Kawadkar,Dept. of Computer Science & Eng. PIES Bhopal,kawadkarpankaj@gmail.com Abstract Dynamic topology and infrastructure less behaviour provide a great facility for adhoc network. Such facility generates easy connection of adhoc network and provides node mobility without loss of connection. In such ability packet dropping is a serious challenge for quality performance of adhoc network. The adhoc network suffered some serious security therats such attacks are black hole attack, malicious attack and worm hole attack that attack occurred a packet dropping problem in adhoc network. For the minimization of attack and packet dropping various authors built various method such method is node authentication, passive feedback scheme, ack-based scheme,reputation based scheme and incentive based scheme, ack-based scheme suffered a problem of massive overhead due to extra acknowledgment packet and it also suffered decision ambiguity if the requested node refuse to send back Acknowledgment. In this dissertation we uses modified ack-based scheme using secure channel for overcoming the problem of decision ambiguity for requested node, improved node authentication and minimize packet dropping in adhoc network. Keywords- mobile ad-hoc network, routing misbehaviour, AODV routing protocol, ACK based approach, network security. I. Introduction Adhoc network is a group collection of mobile node. During the last few years we have all witnessed steadily increasing growth in the deployment of wireless mobile communication networks. Mobile ad hoc networks consist of nodes that are able to communicate through the use of wireless mediums and form dynamic topologies. The basic characteristic of these networks is the complete lack of any kind of infrastructure, and therefore the absence of dedicated nodes that provide network management operations as do the traditional routers in fixed networks. In order to maintain connectivity in a mobile ad hoc network all participating nodes have to perform routing of network traffic. The cooperation of nodes cannot be enforced by a centralized administration authority since one does not exist. Therefore, a network-layer protocol designed for such self-organized networks must enforce connectivity and security requirements in order to guarantee the undisrupted operation of the higher layer protocols. Unfortunately all of the widely used ad hoc routing protocols have no security considerations and trust all the participants to correctly forward routing and data traffic. Figure Fig.1 Shows that scenario of ad-hoc network The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms; fourthly, in MANETs, there are more probabilities for trusted node being compromised and then being used by adversary to launch attacks on networks.
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 23 MANET stands for Mobile Ad- hoc Network.It infrastructureless wireless network. A MANET can be formed either by mobile nodes or by both fixed and mobile nodes. Nodes randomly associate with each other forming arbitrary topologies. They act as both routers and hosts. The ability of mobile routers to self-configure makes this technology suitable for provisioning communication to, for instance, disaster-hit areas where there is no communication infrastructure, conferences, or in emergency search and rescue operations where a network connection is urgently required. The need for mobility in wireless networks necessitated the formation of the MANET working group within The Internet Engineering Task Force (IETF) for developing consistent IP routing protocols for both static and dynamic topologies. Figure : 2 Start Nodes send signal to find the number of other nodes within range Synchronizing between nodes Sender node send messages to receiving node receiving node ready Communication begins Termination Process Stop Receiving node Send back Ready signal Is Wait for sometime NoYes Figure : 3 There are five main security services for MANETs: authentication, confidentiality, integrity, non- repudiation,availability. Authentication means that correct identity is known to communicating partner; Confidentiality means certain message information is kept secure from unauthorized party; integrity means message is unaltered during the communication; no repudiation means the origin of a message cannot deny having sent the message availability means the normal service provision in face of all kinds of attacks. Among all the security services, authentication is probably the most complex and important issue in MANETs since it is the bootstrap of the whole security system. Without knowing exactly who you are talking with, it is worthless to protect your data from being read or altered. Once authentication is achieved in MANET, confidentiality is a matter of encrypting the session using whatever key material the communicating parties agree on. Note that these security services may be provided singly or in combination. In security concern node authentication scheme is better option for secured communication in mobile adhoc network.The most efficient node authentication is ACK-Based scheme.The ACK-Based scheme provides a node authentication security in adhoc network. But this scheme generates a huge amount of packet load in network; the generated packet generates a packet dropping in
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 24 network. The generation of huge amount of wastes the bandwidth of network and performance of network decreases. II. Routing protocol in wireless ad hoc network A. Routing Concept Routing is the act of moving information from source to a destination in an internet work. During this process, at least one intermediate node within the internetwork is encountered. The routing concept basically involves two activities: firstly, determining optimal paths and secondly, transferring the information groups (called packets) through an internetwork. The latter concept is called as packet switching, which is straight forward, and path determination is very complex. Routing protocol uses several matrices to calculate the best path for the routing the packet to its destination. These matrices are a standard measurement that could be number of hops, which is used by the routing algorithm to determine the optimal path for the packet to its destination. The process of path determination is that, routing algorithms initialize and maintain routing tables, which contain the total route information for packet. This route information varies form one routing algorithm to another. Routing tables are filled with a variety of information which is generated by routing algorithms. Most common entries in the routing table are ip-address prefix and the next hop. Routing tables Destination/next hop associations tell the router that a particular destination can be reached optimally by sending the packet to router representing the "next hop" on its way to final destination and ip-address prefix specifies a set of destinations for which the routing entry is valid for. In mobile ad-hoc network every node is having routing capability. Nodes are within the radio range (transmission- range) are called its Neighbors. When the destination node is neighbor of source node, packets are transferred with single hop. When the destination node is neighbor of source node, packets are transferred with single hop. When the destination node is out of radio-range (not a neighbors of source node) then packet are transferred in multiple hops using intermediate nodes. These intermediate nodes (neighbors of source node) forward packets to their neighbors and so on till destination is reached. This is shown below: Figure 4(a) : Single hop transfer when S & D in a radio range Figure 4 (b): Multiple hops when S & D are not in redio range III. ACK-based schemes S D S D
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 25 ACK based scheme overcome the limitation of passive-feedback technique when power control transmission is used. To implement this scheme, an authentication mechanism is used to prevent the next hop from sending a forged ACK packet on behalf of the intended two hop neighbor. The main drawback of this scheme is the huge overhead. In order to reduce the overhead, the authors have proposed that each node asks its two hop neighbor to send back an ACK randomly rather than continuously. Likewise, this extension also fails when the two hop neighbor refuses to send back an ACK. In such situation, the requester node is unable to distinguish who is the malicious node, its next hop or the requested node. To overcome the previous ambiguity in determining the true malicious node, focuses on detecting malicious links instead of malicious nodes.This scheme is based on 2ACK packet that is assigned a fixed route of two hops in the opposite direction of the received data traffic’s route. In this scheme, each packet’s sender maintains the following parameters; (i) list of identifiers of data packets that have been sent out but have not been acknowledged yet, (ii) a counter of the forwarded data packets, (iii) and a counter of the missed packets. IV. Modified ACK-based scheme In the existing ack-based scheme uses 2ack process for the node authentication process in attack scenario in ad- hoc network. These 2ack based scheme generate a huge amount of ack packet in the network and also give decision ambiguity for requested node and then effect quality of service .now we modified these scheme used finite state automata. Finite state automate provide a state of route ack, due to this node ack packet maintain state between node to request and respond node. In this process we used some extra buffered memory for maintain a state of node .that memory area maintain a path state due to given request and response. For maintaining a request packet acknowledgment we calculate the next hop with dsdv protocol concept. Path state maintains a sequence of ack packet. V. Simulation parameter & simulation result: simulation setup Table I Simulation used NS-2.34 Topology area 1200 X 1200 No. of Mobile Nodes 25 Max. No. of Connection 30 Simulation Time 200 Speed 10-20 m/sec Communication Link Capacity 10 Mbps Traffic Intensity 45,85,95,180 Routing Protocol AODV
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 26 In order to simulate the scenarios described above, the implementation was done in NS-2.34 Network Simulator. The simulation scenario to simulate MANET, which uses AODV without packet drop and with packet drop are given in table. results: This set contains result of comparisons of Graph b/w Throughput with secure channel and without secure channel, Average E- E Delay, Packet Delivery Ratio and Avg. Jitter and Routing Load in Ad Hoc network. Comparison b/w packet delivery ratio between with secure channel without secure channel Figure 5: Effect on PDR using secure channel in mobile adhoc network The result shows both the cases, with the secure channel and without the secure channel it is measured that the packet delivery ratio is dramatically decreases when the network are not using secure channel. Hence, for better delivery of packet a secure channel is must in the network. Comparison b/w throughput with secure channel without secure channel Figure 6: Effect on throughput using secure channel in mobile adhoc network This result shows that throughput of the network with secure channel is greater as compared to the throughput of the network without containing secure channel. Decease in throughput indicates that the resources are not utilized in the most efficient manner, it also points out that the available resources can be utilized in a more efficient manner. Clearly it shows that without using secure channel in a network has detrimental effect on throughput. Comparison b/w Routing load with secure channel without secure channel Figure 7: Effect on Routing Load using secure channel in mobile adhoc network This result also shows that, routing load increases without using secure channel as compared to the network using secure channel. Due to this, if the network does not use secure channel then the overhead and traffic load or congestion increases. So the network must use secure channel. VI. Conclusion & Recommendation
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 27 Without infrastructure and node mobility in adhoc network is a great challenge in security concern. For security concern various method are proposed for node authentication in mobile adhoc network. The authentication scheme of leader agent and member surveillance greatly reduces the relative calculating overheads and communication costs. Generally speaking, when leader agent node and surveillance nodes are not destroyed, the united nodes can ensure the reliability, the authentication result is reliable. The dissertation proposes a novel scheme for migrating packet dropping in mobile adhoc network. Our proposed method uses secure channel to overcome the decision ambiguity in requested node and node authentication. In this dissertation secure channel maintain a state of request and reply such fashion minimize packet overhead in network.Our proposed method also removes the node ambiguity in 2ACK hop for authentication process. And minimize a packet dropping in mobile adhoc network Our proposed mechanism has overcome some of the limitations like it has the required some extra buffer memory for maintain a state of request/reply automata. It also introduces little bit computational overhead during route advertisement and path establishment. References: SHRADDHA RAUT, SD CHEDE: “Detection and Removal of Black hole in Mobile Ad-hoc Network [1]. (MANET)”, International Journal of Electrical and Electronics Engineering (IJEEE), ISSN (PRINT): 2231 – 5284 Vol-1 Iss-4, 2012. [2]. Satyendra Tiwari, Anurag Jain and Gajendra Singh Chowhan: “Migrating Packet Dropping in Adhoc Network Based on Modified ACKbased Scheme Using FSA” International Journal on Emerging Technologies 2(2): 102-105(2011). [3]. Kejun Liu, Jing Deng: “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 5, MAY 2007. [4]. Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nemoto: “A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 5, JUNE 2009. [5]. Zonghua Zhang, Farid Na¨ıt-Abdesselam Pin-Han Ho, Xiaodong Lin:” RADAR: a ReputAtion-based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks”, 1525-3511/08©2008 IEEE [6]. Soufine Djahel Farid Na, ıt-Abdesselam and Ashfaq Khokhar:” An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol”, 978-1-4244- 2075-9/08©2008 IEEE. [7]. Zhengming Li and Chunxiao Chigan Danniel Wong: “AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs” 978-1-4244-2324-8/08©2008 IEEE. [8]. Z. Wang, C. Chigan, “Countermeasure uncooperative behaviors with dynamic Trust-Token in VANETs”, in Proc. of IEEE International Conference on Communications (ICC 2007), pp.3959 – 3964, June 2007. [9]. S. Buchegger and J. Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic adhoc networks),” in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MoBiHOC). June 2002 [10]. [11].S. Marti, T. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. of MOBICOM, 2000. [11]. http://www.ietf.org/rfc/rfc2501.txt. date last viewed: 2008-12-31. [12].T. S. Rappaport, “Wireless Comunication: Principles and Practice”, Parentice-Hall, 1996. [13].Zhijiang Chang, Georgi Gayadadjiev, Stamatis Vassiliadis, “Routing Protocols for Mobile Ad-hoc Newtorks: Current Development and Evaluation”. [14].M.O. Rabin. Digitalized signatures and public key functions as intractable as factorization. Technical Report No. 212, MIT Laboratory of Computer Science, MIT/LCS/TR-212, 1979. [15]. G. Gaubatz, J.P. Kaps, and B. Sunar, “Public key cryptography in sensor networks-revisited”. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004. [16].R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, Theory of spread spectrum communications: a tutorial. IEEE Transactions on Communications, 20(5):855.884, May 1982. [17].Mr. Ankur Khetrapal, “ Routing techniques for Mobile Ad Hoc Newtorks Classification and Qualitative/Quantitative Analysis”. [18].Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa: “Ad Hoc Mobile Wireless Network: Principles, Protocols and Applications” [19].S. Murphy, J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks and Applications Journal, pages 183-197, Nov.1996. http://citeseer.nj.nec.com/10238.html
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.6, 2013 28 [20].Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar,Bhavin I. Shah: “ MANET Routing Protocols and Wormhole Attack against AODV” IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010. [21].C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel" Proc. IEEE SICON'97, Apr.1997, pp.197-211. [22].C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications, Special Issue on Ad-H, IOC: Networks, Aug 1999, pp.1369-79.
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar