Suche senden
Hochladen
Multipath Dynamic Source Routing Protocol using Portfolio Selection
•
0 gefällt mir
•
15 views
IRJET Journal
Folgen
https://irjet.net/archives/V3/i2/IRJET-V3I219.pdf
Weniger lesen
Mehr lesen
Ingenieurwesen
Melden
Teilen
Melden
Teilen
1 von 2
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
IJNSA Journal
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
IJNSA Journal
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
IJNSA Journal
Do4301690695
Do4301690695
IJERA Editor
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
IJNSA Journal
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
IJNSA Journal
Empfohlen
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
IJNSA Journal
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
IJNSA Journal
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
IJNSA Journal
Do4301690695
Do4301690695
IJERA Editor
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
IJNSA Journal
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
IJNSA Journal
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
Secure final
Secure final
Vinoth Barithi
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
IJNSA Journal
G041124047
G041124047
IOSR-JEN
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
IJNSA Journal
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
IJECEIAES
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
Research on security of the wlan campus network
Research on security of the wlan campus network
karthik
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
An effective attack preventing routing approach in speed network in manets
An effective attack preventing routing approach in speed network in manets
eSAT Publishing House
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
A44080104
A44080104
IJERA Editor
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IJECEIAES
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Conferenceproceedings
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
K1803046067
K1803046067
IOSR Journals
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Zainab Nayyar
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
IRJET - Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
IRJET Journal
Weitere ähnliche Inhalte
Was ist angesagt?
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
eSAT Publishing House
Secure final
Secure final
Vinoth Barithi
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
IJNSA Journal
G041124047
G041124047
IOSR-JEN
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
IJNSA Journal
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
IJECEIAES
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
IJECEIAES
Research on security of the wlan campus network
Research on security of the wlan campus network
karthik
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Publishing House
An effective attack preventing routing approach in speed network in manets
An effective attack preventing routing approach in speed network in manets
eSAT Publishing House
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
A44080104
A44080104
IJERA Editor
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
eSAT Publishing House
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IJECEIAES
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
IRJET Journal
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Conferenceproceedings
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
K1803046067
K1803046067
IOSR Journals
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Zainab Nayyar
Was ist angesagt?
(20)
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
Secure final
Secure final
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
G041124047
G041124047
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
Research on security of the wlan campus network
Research on security of the wlan campus network
Survey on cloud computing security techniques
Survey on cloud computing security techniques
An effective attack preventing routing approach in speed network in manets
An effective attack preventing routing approach in speed network in manets
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A44080104
A44080104
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Challenges and Surveys in Key Management and Authentication Scheme for Wirele...
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
K1803046067
K1803046067
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Ähnlich wie Multipath Dynamic Source Routing Protocol using Portfolio Selection
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ijcseit
IRJET - Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
IRJET Journal
Survey on cloud computing security techniques
Survey on cloud computing security techniques
eSAT Journals
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
IRJET Journal
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
eSAT Publishing House
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
ijasuc
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
IJERA Editor
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
IJERA Editor
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
AM Publications
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
IJECEIAES
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
710201940
710201940
IJRAT
Secure Group Communication in Grid Environment
Secure Group Communication in Grid Environment
CSCJournals
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
Ähnlich wie Multipath Dynamic Source Routing Protocol using Portfolio Selection
(20)
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
IRJET - Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
Survey on cloud computing security techniques
Survey on cloud computing security techniques
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
710201940
710201940
Secure Group Communication in Grid Environment
Secure Group Communication in Grid Environment
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
Mehr von IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mehr von IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Kürzlich hochgeladen
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Kürzlich hochgeladen
(20)
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Multipath Dynamic Source Routing Protocol using Portfolio Selection
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 03 Issue: 02 | Feb-2016 www.irjet.net © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 103 Multipath Dynamic Source Routing Protocol using Portfolio Selection Miss.Sruthi Raju1, Miss.Rohini M. Muthal2, Miss.Jyoti R. Gaidhani3, Miss.Priyanka S. Brahmane4 1 Sir Visvesvaraya Institute Of Technology, Department of Computer Engineering, Savitribai Phule Pune University Nashik, India 2 Sir Visvesvaraya Institute Of Technology, Department of Computer Engineering, Savitribai Phule Pune University Nashik, India 3 Sir Visvesvaraya Institute Of Technology, Department of Computer Engineering, Savitribai Phule Pune University Nashik, India 4 Sir Visvesvaraya Institute Of Technology, Department of Computer Engineering, Savitribai Phule Pune University Nashik, India Abstract - Multi-path source routing is widely used networks. This kind of routing allows data to transferred from source to destination with multiple paths. There might be jamming problems in this communication. Many proposed solutions given approaches to provide jamming aware allocation traffic to multiple paths. Explored a different new jamming aware traffic allocation taking the help of the concept of portfolio selection. We can also explore the problem of in network inference. The jamming statistics which are updated and which are made available to the nodes in the network. When the input node sends file to destination node, it will allocates traffic to various paths based on the jamming conscious knowledge and also it portfolio selection for best possible result. The goal of this approach is to use the available paths very efficiently besides reducing the possibility of jamming. Key Words: In-network inference, jamming aware traffic allocation, multipath source routing. 1.INTRODUCTION In the network jamming disrupts normal communication flow which is causing problems to the data transfer. It also leads various different attacks such as Denial of Service (DoS attack). Jamming occurs at physical layer of model which has its impact on network. For this is the reason results pertaining to physical layer are to be used to solve this difficulty. Solutions like spread-spectrum and beamforming are some of examples for physical layer solutions. These solution discourage jamming attacks which are made by adversaries. Recent incidents proved that jammers are taking help cross layer protocol knowledge to made attacks and thus it reducing resource requirements for attack. These attacks could decrease the resource consumption to greater extent and thus made process of attacking as feasible as possible. Confidentiality is created to prevent unauthorized users from accessing the sensitive data as it is subject to unauthorized disclose and accessible after being outsourced. Since the introduction of DAS, the confidentiality of outsourced data has been the initial focus among the various research community. To provide confidentiality to the outsourced data, encryption schemes are deployed. Integrity can prevent outsourced data files from being changed and modified. Various schemes have been created to prevent the integrity of the outsourced data, such as proof of the retrievability and prov-able data possession. In these schemes, digital signature schemes and the message authentication codes (MAC) are deployed. Query in data file storage is executed between a receiver and the proxy server. The proxy server can perform some of functions on the outsourced encrypted ciphertexts and convert them to those for the destination. As a result, the receiver can obtain the data file outsourced by the admin without the proxy server knowing the content of the data. 2.OBJECTIVE In this section, we review the schemes which are related to identity-based secure distributed data storage (IBSDDS) schemes 1.1.1 Data Storage Systems 1.1.2 Outsourcing expanding from a data confidentiality to data utility, and pointed out the important research directions in protection of the externally
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 p-ISSN: 2395-0072Volume: 03 Issue: 02 | Feb-2016 www.irjet.net stored data. Kher and Kim surveyed the data storage system which are comprehensively and divided them into the three kinds based on their protective services: networked file systems (NFS), a storage-based intrusion detection systems (SBIDS) and cryptographic file systems (CFS). Networked File Systems In these systems, the proxy servers are assumed to be trusted. They authenticate the receivers and validate access authorities. The interactions between the proxy servers and a receivers are executed in a secure channel. Therefore, this systems cannot gave us an end-to-end data security, namely they cannot ensure the confidentiality of the data file stored at proxy server. In these schemes, a receiver authenticates himself to the proxy server using his password. Then, the proxy server passes authentication solution to the file owner. The owner will make an access permission according to the received information. Architecture Diagram Fig -1: Source and destination with multiple paths 3. CONCLUSIONS AND FUTURE WORK In this paper we implement multi-path source routing with jamming aware traffic allocation. We consider a network in the presence of jammers. The proposed network is built using NS2 which demonstrate the total traffic allocation among available paths. However, the network considers jamming statistics to make decisions for allocating traffic. Hence it is known as jamming – aware traffic allocation. The proposed solution also makes use of portfolio selection theory which was originally developed for making decisions on financial investments. The portfolio selection theiroy makes the network to be more robust to jamming. While making routing decisions, the source node considers jamming statistics and also portfolio selection approach for efficient traffic allocation which improves throughput and reduces congestion or jamming possibilities. The simulation results reveal that the proposed mechanism is effective can improve the performance of network. REFERENCES [1] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., 2001. [2] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” in Proc. USENIX Security Symposium, Washington, DC, Aug. 2003, pp. 15–28. [4] D. J. Thuente and M. Acharya, “Intelligent jamming in wireless networks with applications to 802.11b and other networks,” in Proc. 25th IEEE Communications Society Military Communications Conference (MILCOM’06), Washington, DC, Oct. 2006, pp. 1–7. G. Lin and G. Noubir, “On link layer denial of service in data wireless LANs,” Wireless Communications and Mobile Computing, vol. 5, no. 3, pp. 273–284, May 2005. [5] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Network, vol. 20, no. 3, pp. 41–47, May/Jun. 2006 [6] R. Leung, J. Liu, E. Poon, A.-L. C. Chan, and B. Li, “MP-DSR: A QoSaware multi-path dynamic source routing protocol for wireless ad-hoc networks,” in Proc. 26th Annual IEEE Conference on Local Computer Networks (LCN’01), Tampa, FL, USA, Nov. 2001, pp. 132–141. [7] Patrick Tague, Sidharth Nabar, James A. Ritcey, and Radha Poovendran, “Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEB 2011. [8] H. Markowitz, “Portfolio selection,” The Journal of Finance, vol. 7, no. 1, pp. 77–92, Mar. 1952. © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 104
Jetzt herunterladen