SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 1, January (2014), pp. 28-37
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

DESIGN AND DEVELOPMENT OF AN ALGORITHMIC APPROACH FOR
SELFISH AND MALICIOUS NODE IN CLUSTER BASED ADHOC
WIRELESS NETWORKS
Bhakti Thakre1,

S.V.Sonekar2

1

Research Scholar, Department of CSE, J D College of Engineering and Management, Nagpur,
M.S., India
2
Professor, Head of Department, Department of CSE J D College of Engineering and Management
Nagpur M.S., India.

ABSTRACT
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which
communicate with each other via wireless links either directly or relying on other nodes such as
routers. The network nodes in MANET are free to move randomly therefore, the network topology
of a MANET may change rapidly and unpredictably. Due to the dynamic change in topology finding
route is very difficult. Some nodes misbehave as they participate in route establishment phase but
refuse to forward the data packets to converse their own energy. For detecting routing misbehavior in
MANET lots of techniques are there such as watch-dog, path rater, TWOACK, End to End ACK
scheme. But due to few disadvantages in the above scheme we propose a new scheme called 2ACK.
Mobile Ad hoc networks (MANETs) are an infrastructure less, self configuring network.
These networks can be setup easily anywhere and anytime without any base infrastructure, thus they
have proved to be very efficient is rescue related areas like flood and fire. MANETs are now
extended to be used in military and law enforcement. MANETs still face the major problem of
security and privacy, especially when used in sensitive areas of computing. Secure routing protocols
have been developed to provide various levels of security and privacy in the past.
Keywords: 2 ACK, AODV, MANET, Packet Dropping Attack, RREQ, RREP.
1. INTRODUCTION
The MANETs, as a technology for dynamic wireless networks, had been deployed in military
since 1970s, and thereafter it had been applied in various applications such as; patient monitoring,
airplane exhaustion breakage supervision, business associates sharing information during a meeting;
28
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
attendees using laptop computers to participate in an interactive conference, remote landscapes
monitoring, and emergency disaster relief personnel coordinating efforts after an earthquake [1].
Aloha Protocol transport capacity is proportional to the square root of the density of mobiles
which is very impressive. Finally, this protocol is self-adapting to the node density and it does not
require prior knowledge of the density [2].
Other protocols like AODV can also be used for finding the route in the network. AODV
protocol is a reactive routing protocol which finds route to destination when required. It consists of
routing table which helps to differentiate between expiry and fresh routes. The routing table at node
contains the sequence number and next hop information.
The working of protocol is consists of two phases:
1. Route discovery
2. Route maintenance.
In Route Discovery process, the source node generate RREQ packet, if the path to destination
is not stored in the routing table, and pass it to the neighboring nodes. The neighboring nodes will
pass it to their neighbor and so on. When the packet reached to the destination node, then destination
node generates RREP (Route Reply) packet and send it back to the source node. Thus the path is
established between source and destination node [4].
In Route Maintenance process, the source node is up to date by RERR (Route Error) message
in case of link failure. There are two main factors that cause link failures are:
1. Battery life time.
2. Mobility.
There are three methods that are used to achieve the energy-efficiency in MANETs EnergyControl, Energy-Save and Maximum-Lifetime routing. The Energy-Control approach is permitting
nodes to decide the least amount of transmission power level which is adequate to maintain network
connectivity and to pass the traffic with less energy, the objectives is to increase network capacity
and declining energy consumption. The Energy-Save approach deals with the power loss during the
idle mode and this can be minimized by increasing the amount of time a node spends in the sleep
mode. Finally, the Maximum-Lifetime routing approach emerges for the nodes that have minimum
energy so that they can be eliminated from the path.
Routing protocols in Mobile Ad hoc Network (MANET) send periodic messages to realize
the changes in topology. Sending periodic messages cause overhead. Compared to proactive routing
protocols, reactive routing protocols can cause less overhead. Broadcasting can cause broadcast
storm problem .To discover the route better than broadcasting methodology rebroadcast can done
with the help of neighbor knowledge methods. The approach can significantly decrease the number
of retransmissions so as to reduce the routing overhead and also improve the routing performance.
Thus finding the neighborhood node, we use channel awareness mechanism for data transmission
and to improve the quality [10].
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other’s
packets in order to enable out of range communication. However, in hostile environments, some
nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular
communications. This type of misbehaviour is generally referred to as packet dropping attack or
black hole attack, which is considered as one of the most destructive attacks that leads to the network
collapse [11].
Mobile Ad Hoc Network (MANET) can be described as an autonomous collection of mobile
nodes (users) that communicate over relatively low capacity wireless links, without a centralized
infrastructure. In these networks, nodal mobility and the wireless communication links may lead to
dynamically changing and highly unpredictable topologies. All network functions such as routing,
29
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
multi-hop packet delivery and mobility management have to be performed by the member nodes
themselves, either individually or collectively.

Figure 1: Mobile Adhoc Networks
Consider the above Fig. 1, if node A wants to communicate with B, D or C it can act together
directly because all the three nodes are within the range of A and therefore it can establish a direct
link between them whereas if A is willing to communicate with E it cannot directly do so because E
is not within the range of A and therefore A has to take help of either C, D or B. Therefore this
communication between A and E is known as multi hop communication.
This paper is organized as follows: review of previous work in Section 2, In Section 3, we
describe Routing algorithm in detail and then explain a Selfish and Malicious node used in MANET.
In Section 4, we provide expected results; Section 5 concludes the paper.
2. LITERATURE SURVEY
The mobile nodes that are in radio range of each other can directly communicate, whereas
others need the aid of intermediate nodes to route their packets. Each of the nodes has a wireless
interface to communicate with each other.
Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists of
wireless nodes that move dynamically without any boundary limitation. MANETs are advantageous
because they are quick to install, provide fault tolerance, connectivity and mobility.
There are three types of selfish nodes as follows:
1. Selfish Nodes Type 1 (SN1) - These nodes participate in route establishment but refuse to
forward data packets (which are usually much larger than the routing control packets).
2. Selfish Nodes Type 2 (SN2) - These nodes participate in neither the route establishment phase
nor forward data packets. They only use their energy for transmissions of their own packets.
3. Selfish Nodes Type 3 (SN3) - These nodes behave (or misbehave) differently based on their
energy levels.
When the energy lies between full energy E and a threshold T1, the node behaves properly.
For an energy level between T1 and another lower threshold T2, it behaves like a node of type SN1.
Finally, for an energy level lower than T2, it behaves like a node of type SN2. The relationship
between T1, T2, and E is T2 < T1 < E. The existence of the SN2 type nodes is simply ignored by the
routing protocol [3].
By classifying nodes into clusters, the proposed scheme allows each Cluster Head (CH) to
detect false accusation by a Cluster Member (CM) within the cluster. Node clustering provides a
means to mitigate false accusations.

30
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME

Figure 2: Node Clustering
In fig 2 shows how clusters are constructed in the proposed scheme. While each cluster
consists of one CH and CMs lying within the CH’s transmission range, some nodes within the
transmission area of the CH might not be the member of the cluster and can be the CM of another
cluster [4].
Cluster-based routing is a solution to address nodes heterogeneity, and to limit the amount of
routing information that propagates inside the network. The idea behind clustering is to group the
network nodes into a number of overlapping clusters. Clustering makes possible a hierarchical
routing in which paths are recorded between clusters instead of between nodes. This increases the
routes lifetime, thus decreasing the amount of routing control overhead. Inside the cluster one node
that coordinates the cluster activities is cluster head (CH) [12].

Figure 3: Detection and Reaction Using TRUST (DRUT)
31
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
In fig 3 Cluster head is finding the TRUST value which will satisfy some rules. If any node
does not satisfy the condition then it will be declared as a malicious node.
In this proposed scheme, every node in the network monitors the behavior of its neighbors,
and if any abnormal action is detected, it invokes an algorithm to determine direct trust value [9].
There are three types of attacks that are:
1. Black hole attack: Once it receives the packets it simple discards them without forwarding to
the destination. This attack results in huge loss of data.
2. Man-in-The-Middle Attack: The malicious node will remove the keys of a RREQ and add its
own keys. It will reply to the sender node as if it is the destination, and then it will generate a
new RREQ and forward to the intended destination with its own session key. This attack can
go undetected and the malicious node can easily get hold of information being passed.
3. Location Based attacks: Since we are using Location based routing the possibilities of location
based attacks increases [5].
Ad-Hoc network routing protocols are commonly divided into three main classes; Proactive,
reactive and hybrid protocols. In proactive routing, each node has to maintain one or more tables to
store routing information, and any changes in network topology need to be reflected by propagating
updates throughout the network in order to maintain a consistent network view. In Reactive
Protocols, Reactive routing is also known as on-demand routing protocol since they do not maintain
routing information or routing activity at the network nodes if there is no communication. If a node
wants to send a packet to another node then this protocol searches for the route in an on-demand
manner and establishes the connection in order to transmit and receive the packet. In Hybrid
Protocols, a hybrid model that combines reactive and proactive routing protocols. [6]
3. ALGORITHMS
In Novel Routing Algorithm, message is shared at multiple nodes and then passes through
common channel at the destination. We are using this algorithm to make the routing efficient in
MANET. The algorithm proposed the scheme to reduce the overhead and network stability. This
method also maintains the Data confidentiality at various nodes.

Figure 4: Host A wants to send a packet to host G and the initial route is shown on the left scenario.
In the meantime host C changes its location as shown on the right scenario and a new route is
chosen.
The fig 4 depicted two possible scenarios in a MANET when host A wants to send a packet
to host G. An important aspect of any routing algorithm for MANETs is how the routing table is
updated. It is clear that better routes can be determined whenever a host has more recent information
about the network configuration. Routing information can be obtained both locally and globally.
Local information is obtained from a neighbor node that periodically broadcasts only the changes
occurred since the last time [12].
32
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
We describes the Rebroadcast delay description for the node ni. This Algorithm is used for
reducing routing overhead in route discovery [10].
As MANETs typically lack a central authority for authentication and key distribution,
security mechanisms must be scalable and capable of frequent topology changes. In this section we
proposed cryptography based secure technique to handle malicious node in MANETs. The technique
consists of following steps.
1. There will be a dedicated node called registration node (RN) and its function will be to
generate and assign registration tokens to each and every node.
2. Whenever the two nodes want to communicate with each other they have to request to RN
for a registration token.
3. The request packet will contain source node identity, timestamp, home address and
token request. RP= (Nid,timestamp,h_addSN,reqR)
4. When RN receives request from a source node, first it will check the node identity and its
home address that to whom network it belongs.
5. After successful confirmation it generates a registration token and assign to node.
Registration token will contain node ID,timestamp, duration, public key, nonce and that
token will be encrypted using private key of RN.
6. After receiving the Registration token by a source node it sends an ACK signal to RN. The
ACK signal will contain node ID, timestamp .The ACK signal will be encrypted using
Public key of RN.
7. Steps 3-6 will be carried out between destination node and RN too.
8. After getting registration token from RN by both source and destination nodes now they
can proceed their communication.
In the above eight steps clearly mention that without getting registration token no
Communication can be initiated between nodes [8].
2 Ack Scheme works with three nodes in which source send packet to the first node and then
that node will send information to next node. Similarly node N1 in the fig 5 send packet to node N2
similarly to node N3. After receiving the packet these nodes will send the acknowledgement packet
to the previous node.

Figure 5: Working of 2 Ack Scheme
The triplet N1→N2→N3 is used as an example to illustrate 2ACK Scheme. One thing that
such codes execute on each of the sender/receiver of the 2ack packets. Data Packet Sender Side
Algorithm (Node N1) Find all the active nodes. Find all routes between the active nodes. Choose the
destination node. Get the path to destination from the routing table. If Yes then send the data packet
to destination. If No - Destination is unreachable. After sending the Data packet Start timer and wait
for the ACK (acknowledgment) of the third node in the opposite path as sent. After the timer expired
33
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
check for the ACK (acknowledgment). If the ACK has not come then corresponding node attached to
that link declared as misbehaving node.
2 Ack Packet Sender Side (Node N3) Algorithm works like as given below:
1.Cpkts—>0 , Cack—>0, i, n //Initialization at node N3
2: while true do
3: if (data packet received) then
4: Cpkts ++ // Increase the counter of received packets
5: if (Cack/Cpkts <Rack) // The data packet needs to be acknowledged
6: Prepare 2ACK
7: Send 2ACK
8: Cack ++, i - - //Increase the counter of acknowledged packets
9: end
10: end
11:end
Here, Cpkt is the variable used to count the no of packets received by the node. Cack will
count the no of acknowledgement received from the node. Whereas Rack is defined as a ratio of the
total number of data packets acknowledge to the total number of Data packets received.
In this paper Novel routing algorithm is used in which we will send the packet to each and
every node present in the cluster. If any of the nodes failed to send the acknowledgement of the
packet then the algorithm will choose the alternative path on which source has already send the
packet. Whenever a mobile node wants to join the MANET, it listens to the medium to find out a
neighbor node n. Once a neighbor node n is identified the mobile host sends a request packet to n
asking for its routing table which is sent back to the host. From this moment on the new mobile host
can start routing and sending packets in the MANET.
The routing protocol is based on the physical location of a destination host d stored in the
routing table. If there is an entry in the routing table for host d, the best possible route is chosen using
a shortest path algorithm. The route comprised of a list of nodes and the corresponding TTL’s, is
attached to the packet which is sent to first-host in the list. If host d is not found in the routing table,
the mobile node sends a message to the nearest fixed node that tries to find the destination node. In
Fig 6, Host A wants to send a packet to host G and the initial route, while in the meantime host C
changes its location and a new route is chosen.
In any Cluster the most important member is Cluster Head. Only Cluster Head will
communicate with another cluster Head for communication.ACO is an evolutionary algorithm. It is
inspired by the foraging behavior of ants. The ants release chemical called pheromones on the path
while moving along the path. As more number of ants moves along the path, the pheromone
concentration increases. The more the pheromone concentration, more is the chance for a new ant to
choose that path to reach the food from the colony. The path chosen by the ants will be the shortest
path from nest to food. The process is a kind of distributed optimization mechanism, in which they
find the shortest distance from the food to colony.
An ACO (Ant Colony Optimization) Algorithm is used for selecting cluster head from the
cluster of n nodes.
1. Initialize each node
2. weight=0
3. isHead=false
4. pheromone=0
5. Convector=empty //To store al neighbor nodes According to instantaneous topology.
6. Find neighbor //nodes in Range
34
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
7. If Euclidian distance < Range
8. Edge exists
9. Else
10. No edge exists
11. Increment weight // connectivity measure
12. Set α, β values // control parameters
13. Iterate i to n times
14. Select ith node as Cluster head
15. Select neighbor with maximum probability as next cluster head until all nodes are
covered.
16. Update pheromone of the selected cluster heads
17. Find final set of cluster heads with maximum probability (with Weight and Updated
pheromone).
A node is said to be in the range of another node, if the Euclidian distance between the two
nodes is within the range of each other. A hierarchical routing is done using clustering in which paths
are recorded between clusters instead of between nodes. This reduces the amount of routing control
overhead. ACO finds the minimal set of cluster heads. This is an iterative process and the output
obtained is a local solution. Pheromone value associated with each node and its visibility. Visibility
refers to the number of nodes that will be covered if the node is added into the cluster head set.
Visibility keeps changing as topology changes. The pheromone value associated with a node is
updated for each iteration of the algorithm. For each iteration, a node is selected as the cluster head
and the next cluster head is selected based on the pheromone and visibility of its neighbor nodes.
This process continues until all the nodes in the network are covered. A node is said to be covered if
it is a cluster head or falls in the range of an already selected cluster head.
4. RESULT
In this paper we proposed, a better solution for energy saving process by improving quality in
selection of nodes which are best fitted for routing in between wireless nodes. The most important
parameter used for finding the route is the transmission range of the node. Node who is in the middle
of the cluster can transmit the packet for long time. So, that node will be declared as a cluster head of
the network. Aloha Protocol is used for transmitting packets because its transmission range is better
than any other protocol. Moreover research worked can be done with Time on demand distance
vector protocol for further experimentation. After working on Omnetpp we can see the result of 2
Ack Scheme on Omnetpp as shown below.

(A)

(B)

Figure 6: 2 Ack simulation on Omnetpp with Aloha protocol
35
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
In fig 6 A and B shows the Acknowledgement from Host 2 to Host 1 and from Host 1 to
Server. Acknowledgement is received from Basic parameters like energy carrying capacity, buffer
size, speed of nodes, and mobility rate and transmission range for Aloha have been monitored to
have changes for desired results.
In this work first module is 2 Ack Scheme then second module is random selection of
malicious node and then Clustering and moving the nodes in the network.
5. CONCLUSION
The attack schemes, as well as prevention, detection and reaction mechanisms have been
explored. We categorized them into three categories according to their goals and their specific
strategies. A comparative study between them was then conducted to highlight their respective
effectiveness and limitations. We concluded that most of the proposed schemes in the first, second or
third defense line are based upon certain assumptions that are not always valid due to the dynamic
nature of MANETs and their specific characteristics.
In this paper, investigation is done on the misbehavior of nodes and a new approach is
proposed for detection and isolation of misbehaving nodes. Suggested approach can be united on top
of any source routing protocol such as ALOHA and is based on sending acknowledgement packets
for reception of data packets and using promiscuous mode for counting the number of data packet
such that it overcomes the problem of misbehaving nodes.ACO Algorithm is used to find the
effective cluster Head in the cluster.
6. REFERENCES
[1]

[2]

[3]
[4]

[5]

[6]

[7]

[8]

Nada M. Badr and Noureldien A. Noureldien , “Review of mobile ad hoc networks security
attacks and countermeasures”, International journal of computer engineering & Technology
2013.
François Baccelli, Bartłomiej Błaszczyszyn, and Paul Mühlethaler, “An Aloha Protocol for
Multihop Mobile Wireless Networks,” IEEE transactions on information theory, vol. 52, no.
2, february 2006.
Prof. Shalini V. Wankhade,” 2ACK-Scheme: Routing Misbehavior Detection in MANETs
Using OLSR”, July 2012.
Abhilash Sharma and Birinder Singh, “Fault Tolerance with Clustering Approach in Ad-Hoc
on Demand Protocol”, International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181 Vol. 2 Issue 9, September – 2013.
Namrata Marium Chacko, Getzi P. Leelaipushpam, “A Reactive Protocol For Privacy
Preserving Using Location Based Routing In Manets”, IJCSN International Journal of
Computer Science and Network, Vol 2, Issue 2, April 2013.
Aarti , Dr. S. S. Tyagi “ Study of MANET: Characteristics, Challenges, Application and
Security Attacks " , International Journal of Advanced Research in Computer Science and
Software Engineering Volume 3, Issue 5, May 2013.
Ms.T.R.Panke, “Clustering Based Certificate Revocation Scheme for Malicious node in
MANET “, International Journal of Scientific and Research Publications, Volume 3, Issue 5,
May 2013.
Manoj V. Mori1, G.B. Jethava, “Node registration in MANET”, International Journal of
Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 1, January
- February 2013.

36
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
[9]

[10]

[11]

[12]
[13]

[14]

[15]

[16]

[17]

Aravindh S, Vinoth R S and Vijayan R, “A Trust Based Approach for Detection and Isolation
of Malicious Nodes in Manet”, International Journal of Engineering and Technology (IJET)
Vol 5 No 1 Feb-Mar 2013.
V.Deeban Chakravarthy, V.Divya Renga, “A Neighbor Coverage Based Probabilistic
Rebroadcast For Reducing Routing Overhead In Mobile Ad Hoc Networks”, International
Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1,
January 2013.
Soufiene djahel, farid abdesselam and zonghua zhang, “Mitigating packet dropping problem
in mobile ad hoc networks: proposals and challenges”, IEEE communications surveys &
tutorials, vol. 13, no. 4, fourth quarter 2011.
Ratish Agarwal, Dr. Mahesh Motwani, “Survey of clustering algorithms for MANET”,
International Journal on Computer Science and Engineering Vol.1(2), 2009, 98-104.
K Muralidhar, “An Improved Node-Initiated Message Ferrying Approach for Data
Dissemination in Disconnected Mobile Ad Hoc Networks”, International Journal of
Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 469 - 476,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Prerna Malhotra, “A Survey of Energy Efficient AODV Routing Algorithms in MANET”,
International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2,
2013, pp. 213 - 220, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Shah Vrutik, Dr.Nilesh Modi and Patani Ashwin, “AODVgap-An Acknowledgment Based
Approach to Mitigate Selective Forwarding Attacks in MANET”, International Journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 458 - 469,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
S. A. Nagtilak and Prof. U.A. Mande, “The Detection of Routing Misbehavior in Mobile Ad
Hoc Networks using the 2ack Scheme with OLSR Protocol”, International Journal of
Computer Engineering & Technology (IJCET), Volume 1, Issue 1, 2010, pp. 213 - 234,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Nada M. Badr and Noureldien A. Noureldien, “Review of Mobile Ad Hoc Networks Security
Attacks and Countermeasures”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 6, 2013, pp. 145 - 155, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

37

Weitere ähnliche Inhalte

Was ist angesagt?

Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Clustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoClustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoIAEME Publication
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network Sandeep Kumar
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networIAEME Publication
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
Route Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networksarpublication
 
Statistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsStatistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsIAEME Publication
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSEECJOURNAL
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
 

Was ist angesagt? (18)

Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Clustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoClustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwo
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networ
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
L046027479
L046027479L046027479
L046027479
 
Route Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networks
 
Statistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transportsStatistical performance analysis of wireless communication in public transports
Statistical performance analysis of wireless communication in public transports
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETS
 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
 
40120140507001
4012014050700140120140507001
40120140507001
 

Ähnlich wie 50120140501004

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...IJECEIAES
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2IAEME Publication
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna designijwmn
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSIJCNCJournal
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 

Ähnlich wie 50120140501004 (20)

Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...Performance and statistical analysis of ant colony route in  mobile ad-hoc ne...
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
40120140507001
4012014050700140120140507001
40120140507001
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
eaodv
eaodveaodv
eaodv
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGSCONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
CONTEXT-AWARE ENERGY CONSERVING ROUTING ALGORITHM FOR INTERNET OF THINGS
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Kürzlich hochgeladen (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

50120140501004

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 1, January (2014), pp. 28-37 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME DESIGN AND DEVELOPMENT OF AN ALGORITHMIC APPROACH FOR SELFISH AND MALICIOUS NODE IN CLUSTER BASED ADHOC WIRELESS NETWORKS Bhakti Thakre1, S.V.Sonekar2 1 Research Scholar, Department of CSE, J D College of Engineering and Management, Nagpur, M.S., India 2 Professor, Head of Department, Department of CSE J D College of Engineering and Management Nagpur M.S., India. ABSTRACT A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes such as routers. The network nodes in MANET are free to move randomly therefore, the network topology of a MANET may change rapidly and unpredictably. Due to the dynamic change in topology finding route is very difficult. Some nodes misbehave as they participate in route establishment phase but refuse to forward the data packets to converse their own energy. For detecting routing misbehavior in MANET lots of techniques are there such as watch-dog, path rater, TWOACK, End to End ACK scheme. But due to few disadvantages in the above scheme we propose a new scheme called 2ACK. Mobile Ad hoc networks (MANETs) are an infrastructure less, self configuring network. These networks can be setup easily anywhere and anytime without any base infrastructure, thus they have proved to be very efficient is rescue related areas like flood and fire. MANETs are now extended to be used in military and law enforcement. MANETs still face the major problem of security and privacy, especially when used in sensitive areas of computing. Secure routing protocols have been developed to provide various levels of security and privacy in the past. Keywords: 2 ACK, AODV, MANET, Packet Dropping Attack, RREQ, RREP. 1. INTRODUCTION The MANETs, as a technology for dynamic wireless networks, had been deployed in military since 1970s, and thereafter it had been applied in various applications such as; patient monitoring, airplane exhaustion breakage supervision, business associates sharing information during a meeting; 28
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME attendees using laptop computers to participate in an interactive conference, remote landscapes monitoring, and emergency disaster relief personnel coordinating efforts after an earthquake [1]. Aloha Protocol transport capacity is proportional to the square root of the density of mobiles which is very impressive. Finally, this protocol is self-adapting to the node density and it does not require prior knowledge of the density [2]. Other protocols like AODV can also be used for finding the route in the network. AODV protocol is a reactive routing protocol which finds route to destination when required. It consists of routing table which helps to differentiate between expiry and fresh routes. The routing table at node contains the sequence number and next hop information. The working of protocol is consists of two phases: 1. Route discovery 2. Route maintenance. In Route Discovery process, the source node generate RREQ packet, if the path to destination is not stored in the routing table, and pass it to the neighboring nodes. The neighboring nodes will pass it to their neighbor and so on. When the packet reached to the destination node, then destination node generates RREP (Route Reply) packet and send it back to the source node. Thus the path is established between source and destination node [4]. In Route Maintenance process, the source node is up to date by RERR (Route Error) message in case of link failure. There are two main factors that cause link failures are: 1. Battery life time. 2. Mobility. There are three methods that are used to achieve the energy-efficiency in MANETs EnergyControl, Energy-Save and Maximum-Lifetime routing. The Energy-Control approach is permitting nodes to decide the least amount of transmission power level which is adequate to maintain network connectivity and to pass the traffic with less energy, the objectives is to increase network capacity and declining energy consumption. The Energy-Save approach deals with the power loss during the idle mode and this can be minimized by increasing the amount of time a node spends in the sleep mode. Finally, the Maximum-Lifetime routing approach emerges for the nodes that have minimum energy so that they can be eliminated from the path. Routing protocols in Mobile Ad hoc Network (MANET) send periodic messages to realize the changes in topology. Sending periodic messages cause overhead. Compared to proactive routing protocols, reactive routing protocols can cause less overhead. Broadcasting can cause broadcast storm problem .To discover the route better than broadcasting methodology rebroadcast can done with the help of neighbor knowledge methods. The approach can significantly decrease the number of retransmissions so as to reduce the routing overhead and also improve the routing performance. Thus finding the neighborhood node, we use channel awareness mechanism for data transmission and to improve the quality [10]. In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other’s packets in order to enable out of range communication. However, in hostile environments, some nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular communications. This type of misbehaviour is generally referred to as packet dropping attack or black hole attack, which is considered as one of the most destructive attacks that leads to the network collapse [11]. Mobile Ad Hoc Network (MANET) can be described as an autonomous collection of mobile nodes (users) that communicate over relatively low capacity wireless links, without a centralized infrastructure. In these networks, nodal mobility and the wireless communication links may lead to dynamically changing and highly unpredictable topologies. All network functions such as routing, 29
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME multi-hop packet delivery and mobility management have to be performed by the member nodes themselves, either individually or collectively. Figure 1: Mobile Adhoc Networks Consider the above Fig. 1, if node A wants to communicate with B, D or C it can act together directly because all the three nodes are within the range of A and therefore it can establish a direct link between them whereas if A is willing to communicate with E it cannot directly do so because E is not within the range of A and therefore A has to take help of either C, D or B. Therefore this communication between A and E is known as multi hop communication. This paper is organized as follows: review of previous work in Section 2, In Section 3, we describe Routing algorithm in detail and then explain a Selfish and Malicious node used in MANET. In Section 4, we provide expected results; Section 5 concludes the paper. 2. LITERATURE SURVEY The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each of the nodes has a wireless interface to communicate with each other. Mobile Ad hoc Network (MANET) do not have any fixed infrastructure and consists of wireless nodes that move dynamically without any boundary limitation. MANETs are advantageous because they are quick to install, provide fault tolerance, connectivity and mobility. There are three types of selfish nodes as follows: 1. Selfish Nodes Type 1 (SN1) - These nodes participate in route establishment but refuse to forward data packets (which are usually much larger than the routing control packets). 2. Selfish Nodes Type 2 (SN2) - These nodes participate in neither the route establishment phase nor forward data packets. They only use their energy for transmissions of their own packets. 3. Selfish Nodes Type 3 (SN3) - These nodes behave (or misbehave) differently based on their energy levels. When the energy lies between full energy E and a threshold T1, the node behaves properly. For an energy level between T1 and another lower threshold T2, it behaves like a node of type SN1. Finally, for an energy level lower than T2, it behaves like a node of type SN2. The relationship between T1, T2, and E is T2 < T1 < E. The existence of the SN2 type nodes is simply ignored by the routing protocol [3]. By classifying nodes into clusters, the proposed scheme allows each Cluster Head (CH) to detect false accusation by a Cluster Member (CM) within the cluster. Node clustering provides a means to mitigate false accusations. 30
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Figure 2: Node Clustering In fig 2 shows how clusters are constructed in the proposed scheme. While each cluster consists of one CH and CMs lying within the CH’s transmission range, some nodes within the transmission area of the CH might not be the member of the cluster and can be the CM of another cluster [4]. Cluster-based routing is a solution to address nodes heterogeneity, and to limit the amount of routing information that propagates inside the network. The idea behind clustering is to group the network nodes into a number of overlapping clusters. Clustering makes possible a hierarchical routing in which paths are recorded between clusters instead of between nodes. This increases the routes lifetime, thus decreasing the amount of routing control overhead. Inside the cluster one node that coordinates the cluster activities is cluster head (CH) [12]. Figure 3: Detection and Reaction Using TRUST (DRUT) 31
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME In fig 3 Cluster head is finding the TRUST value which will satisfy some rules. If any node does not satisfy the condition then it will be declared as a malicious node. In this proposed scheme, every node in the network monitors the behavior of its neighbors, and if any abnormal action is detected, it invokes an algorithm to determine direct trust value [9]. There are three types of attacks that are: 1. Black hole attack: Once it receives the packets it simple discards them without forwarding to the destination. This attack results in huge loss of data. 2. Man-in-The-Middle Attack: The malicious node will remove the keys of a RREQ and add its own keys. It will reply to the sender node as if it is the destination, and then it will generate a new RREQ and forward to the intended destination with its own session key. This attack can go undetected and the malicious node can easily get hold of information being passed. 3. Location Based attacks: Since we are using Location based routing the possibilities of location based attacks increases [5]. Ad-Hoc network routing protocols are commonly divided into three main classes; Proactive, reactive and hybrid protocols. In proactive routing, each node has to maintain one or more tables to store routing information, and any changes in network topology need to be reflected by propagating updates throughout the network in order to maintain a consistent network view. In Reactive Protocols, Reactive routing is also known as on-demand routing protocol since they do not maintain routing information or routing activity at the network nodes if there is no communication. If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and receive the packet. In Hybrid Protocols, a hybrid model that combines reactive and proactive routing protocols. [6] 3. ALGORITHMS In Novel Routing Algorithm, message is shared at multiple nodes and then passes through common channel at the destination. We are using this algorithm to make the routing efficient in MANET. The algorithm proposed the scheme to reduce the overhead and network stability. This method also maintains the Data confidentiality at various nodes. Figure 4: Host A wants to send a packet to host G and the initial route is shown on the left scenario. In the meantime host C changes its location as shown on the right scenario and a new route is chosen. The fig 4 depicted two possible scenarios in a MANET when host A wants to send a packet to host G. An important aspect of any routing algorithm for MANETs is how the routing table is updated. It is clear that better routes can be determined whenever a host has more recent information about the network configuration. Routing information can be obtained both locally and globally. Local information is obtained from a neighbor node that periodically broadcasts only the changes occurred since the last time [12]. 32
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME We describes the Rebroadcast delay description for the node ni. This Algorithm is used for reducing routing overhead in route discovery [10]. As MANETs typically lack a central authority for authentication and key distribution, security mechanisms must be scalable and capable of frequent topology changes. In this section we proposed cryptography based secure technique to handle malicious node in MANETs. The technique consists of following steps. 1. There will be a dedicated node called registration node (RN) and its function will be to generate and assign registration tokens to each and every node. 2. Whenever the two nodes want to communicate with each other they have to request to RN for a registration token. 3. The request packet will contain source node identity, timestamp, home address and token request. RP= (Nid,timestamp,h_addSN,reqR) 4. When RN receives request from a source node, first it will check the node identity and its home address that to whom network it belongs. 5. After successful confirmation it generates a registration token and assign to node. Registration token will contain node ID,timestamp, duration, public key, nonce and that token will be encrypted using private key of RN. 6. After receiving the Registration token by a source node it sends an ACK signal to RN. The ACK signal will contain node ID, timestamp .The ACK signal will be encrypted using Public key of RN. 7. Steps 3-6 will be carried out between destination node and RN too. 8. After getting registration token from RN by both source and destination nodes now they can proceed their communication. In the above eight steps clearly mention that without getting registration token no Communication can be initiated between nodes [8]. 2 Ack Scheme works with three nodes in which source send packet to the first node and then that node will send information to next node. Similarly node N1 in the fig 5 send packet to node N2 similarly to node N3. After receiving the packet these nodes will send the acknowledgement packet to the previous node. Figure 5: Working of 2 Ack Scheme The triplet N1→N2→N3 is used as an example to illustrate 2ACK Scheme. One thing that such codes execute on each of the sender/receiver of the 2ack packets. Data Packet Sender Side Algorithm (Node N1) Find all the active nodes. Find all routes between the active nodes. Choose the destination node. Get the path to destination from the routing table. If Yes then send the data packet to destination. If No - Destination is unreachable. After sending the Data packet Start timer and wait for the ACK (acknowledgment) of the third node in the opposite path as sent. After the timer expired 33
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME check for the ACK (acknowledgment). If the ACK has not come then corresponding node attached to that link declared as misbehaving node. 2 Ack Packet Sender Side (Node N3) Algorithm works like as given below: 1.Cpkts—>0 , Cack—>0, i, n //Initialization at node N3 2: while true do 3: if (data packet received) then 4: Cpkts ++ // Increase the counter of received packets 5: if (Cack/Cpkts <Rack) // The data packet needs to be acknowledged 6: Prepare 2ACK 7: Send 2ACK 8: Cack ++, i - - //Increase the counter of acknowledged packets 9: end 10: end 11:end Here, Cpkt is the variable used to count the no of packets received by the node. Cack will count the no of acknowledgement received from the node. Whereas Rack is defined as a ratio of the total number of data packets acknowledge to the total number of Data packets received. In this paper Novel routing algorithm is used in which we will send the packet to each and every node present in the cluster. If any of the nodes failed to send the acknowledgement of the packet then the algorithm will choose the alternative path on which source has already send the packet. Whenever a mobile node wants to join the MANET, it listens to the medium to find out a neighbor node n. Once a neighbor node n is identified the mobile host sends a request packet to n asking for its routing table which is sent back to the host. From this moment on the new mobile host can start routing and sending packets in the MANET. The routing protocol is based on the physical location of a destination host d stored in the routing table. If there is an entry in the routing table for host d, the best possible route is chosen using a shortest path algorithm. The route comprised of a list of nodes and the corresponding TTL’s, is attached to the packet which is sent to first-host in the list. If host d is not found in the routing table, the mobile node sends a message to the nearest fixed node that tries to find the destination node. In Fig 6, Host A wants to send a packet to host G and the initial route, while in the meantime host C changes its location and a new route is chosen. In any Cluster the most important member is Cluster Head. Only Cluster Head will communicate with another cluster Head for communication.ACO is an evolutionary algorithm. It is inspired by the foraging behavior of ants. The ants release chemical called pheromones on the path while moving along the path. As more number of ants moves along the path, the pheromone concentration increases. The more the pheromone concentration, more is the chance for a new ant to choose that path to reach the food from the colony. The path chosen by the ants will be the shortest path from nest to food. The process is a kind of distributed optimization mechanism, in which they find the shortest distance from the food to colony. An ACO (Ant Colony Optimization) Algorithm is used for selecting cluster head from the cluster of n nodes. 1. Initialize each node 2. weight=0 3. isHead=false 4. pheromone=0 5. Convector=empty //To store al neighbor nodes According to instantaneous topology. 6. Find neighbor //nodes in Range 34
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 7. If Euclidian distance < Range 8. Edge exists 9. Else 10. No edge exists 11. Increment weight // connectivity measure 12. Set α, β values // control parameters 13. Iterate i to n times 14. Select ith node as Cluster head 15. Select neighbor with maximum probability as next cluster head until all nodes are covered. 16. Update pheromone of the selected cluster heads 17. Find final set of cluster heads with maximum probability (with Weight and Updated pheromone). A node is said to be in the range of another node, if the Euclidian distance between the two nodes is within the range of each other. A hierarchical routing is done using clustering in which paths are recorded between clusters instead of between nodes. This reduces the amount of routing control overhead. ACO finds the minimal set of cluster heads. This is an iterative process and the output obtained is a local solution. Pheromone value associated with each node and its visibility. Visibility refers to the number of nodes that will be covered if the node is added into the cluster head set. Visibility keeps changing as topology changes. The pheromone value associated with a node is updated for each iteration of the algorithm. For each iteration, a node is selected as the cluster head and the next cluster head is selected based on the pheromone and visibility of its neighbor nodes. This process continues until all the nodes in the network are covered. A node is said to be covered if it is a cluster head or falls in the range of an already selected cluster head. 4. RESULT In this paper we proposed, a better solution for energy saving process by improving quality in selection of nodes which are best fitted for routing in between wireless nodes. The most important parameter used for finding the route is the transmission range of the node. Node who is in the middle of the cluster can transmit the packet for long time. So, that node will be declared as a cluster head of the network. Aloha Protocol is used for transmitting packets because its transmission range is better than any other protocol. Moreover research worked can be done with Time on demand distance vector protocol for further experimentation. After working on Omnetpp we can see the result of 2 Ack Scheme on Omnetpp as shown below. (A) (B) Figure 6: 2 Ack simulation on Omnetpp with Aloha protocol 35
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME In fig 6 A and B shows the Acknowledgement from Host 2 to Host 1 and from Host 1 to Server. Acknowledgement is received from Basic parameters like energy carrying capacity, buffer size, speed of nodes, and mobility rate and transmission range for Aloha have been monitored to have changes for desired results. In this work first module is 2 Ack Scheme then second module is random selection of malicious node and then Clustering and moving the nodes in the network. 5. CONCLUSION The attack schemes, as well as prevention, detection and reaction mechanisms have been explored. We categorized them into three categories according to their goals and their specific strategies. A comparative study between them was then conducted to highlight their respective effectiveness and limitations. We concluded that most of the proposed schemes in the first, second or third defense line are based upon certain assumptions that are not always valid due to the dynamic nature of MANETs and their specific characteristics. In this paper, investigation is done on the misbehavior of nodes and a new approach is proposed for detection and isolation of misbehaving nodes. Suggested approach can be united on top of any source routing protocol such as ALOHA and is based on sending acknowledgement packets for reception of data packets and using promiscuous mode for counting the number of data packet such that it overcomes the problem of misbehaving nodes.ACO Algorithm is used to find the effective cluster Head in the cluster. 6. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Nada M. Badr and Noureldien A. Noureldien , “Review of mobile ad hoc networks security attacks and countermeasures”, International journal of computer engineering & Technology 2013. François Baccelli, Bartłomiej Błaszczyszyn, and Paul Mühlethaler, “An Aloha Protocol for Multihop Mobile Wireless Networks,” IEEE transactions on information theory, vol. 52, no. 2, february 2006. Prof. Shalini V. Wankhade,” 2ACK-Scheme: Routing Misbehavior Detection in MANETs Using OLSR”, July 2012. Abhilash Sharma and Birinder Singh, “Fault Tolerance with Clustering Approach in Ad-Hoc on Demand Protocol”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 9, September – 2013. Namrata Marium Chacko, Getzi P. Leelaipushpam, “A Reactive Protocol For Privacy Preserving Using Location Based Routing In Manets”, IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013. Aarti , Dr. S. S. Tyagi “ Study of MANET: Characteristics, Challenges, Application and Security Attacks " , International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013. Ms.T.R.Panke, “Clustering Based Certificate Revocation Scheme for Malicious node in MANET “, International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013. Manoj V. Mori1, G.B. Jethava, “Node registration in MANET”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 2, Issue 1, January - February 2013. 36
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME [9] [10] [11] [12] [13] [14] [15] [16] [17] Aravindh S, Vinoth R S and Vijayan R, “A Trust Based Approach for Detection and Isolation of Malicious Nodes in Manet”, International Journal of Engineering and Technology (IJET) Vol 5 No 1 Feb-Mar 2013. V.Deeban Chakravarthy, V.Divya Renga, “A Neighbor Coverage Based Probabilistic Rebroadcast For Reducing Routing Overhead In Mobile Ad Hoc Networks”, International Journal of Emerging Technology and Advanced Engineering Volume 3, Special Issue 1, January 2013. Soufiene djahel, farid abdesselam and zonghua zhang, “Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges”, IEEE communications surveys & tutorials, vol. 13, no. 4, fourth quarter 2011. Ratish Agarwal, Dr. Mahesh Motwani, “Survey of clustering algorithms for MANET”, International Journal on Computer Science and Engineering Vol.1(2), 2009, 98-104. K Muralidhar, “An Improved Node-Initiated Message Ferrying Approach for Data Dissemination in Disconnected Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 469 - 476, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Prerna Malhotra, “A Survey of Energy Efficient AODV Routing Algorithms in MANET”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 213 - 220, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Shah Vrutik, Dr.Nilesh Modi and Patani Ashwin, “AODVgap-An Acknowledgment Based Approach to Mitigate Selective Forwarding Attacks in MANET”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 458 - 469, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. S. A. Nagtilak and Prof. U.A. Mande, “The Detection of Routing Misbehavior in Mobile Ad Hoc Networks using the 2ack Scheme with OLSR Protocol”, International Journal of Computer Engineering & Technology (IJCET), Volume 1, Issue 1, 2010, pp. 213 - 234, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Nada M. Badr and Noureldien A. Noureldien, “Review of Mobile Ad Hoc Networks Security Attacks and Countermeasures”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 145 - 155, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 37