Bandwidth Estimation in Network Probing Techniques Utilizing Min-Plus Algebraic Methods
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
The Effectiveness of Jaya Optimization for Energy Aware Cluster Based Routing in Wireless Sensor Networks
Stress Analysis and Detection from Wearable Devices
Intrusion-Tolerant Sink Configuration: A Key to Prolonged Lifetime in Wireless Sensor Networks
Channel Estimation and It’s Techniques: A Survey
Impact of Mobility on Power Consumption in RPL
Implementation of Traffic Engineering Technique in MPLS Network using RSVP
FER Performance Analysis of Adaptive MIMO with OSTBC for Wireless Communication by QPSK Modulation Technique
Performance Evaluation of Advanced Congestion Control Mechanisms for COAP
DGS Based MIMO Microstrip Antenna for Wireless Applications
A Review on Optimized FFT/IFFT Architectures for OFDM Systems
Balanced Unequal Clustering AlgorithmFor Wireless Sensor Network
HHT and DWT Based MIMO-OFDM for Various ModulationSchemes: A Comparative Approach
Study and Comparison of Distributed Energy Efficient Clustering Protocols in Wireless Sensor Network: A Review
Diagnosis of Anemia using Non-Invasive Anemia Detector through Parametrical Analysis
One of the most common types of network attacks involves non-forwardable bandwidth nodes that pretend to be intermediate nodes on the route to certain destinations and drop every packet that subsequently passes through it. This paper proposes attacks through black holes as an analysis method for detecting malicious nodes in Mobile Ad-hoc Networks (MANET). Because the mechanism and protocol are collaborative, it can confidently analyse and identify malicious hosts. To test the effectiveness of this approach, it uses a hybrid Hierarchical Link State routing protocol based on Modified-ZoneBased Hierarchical Link State Routing Protocol (M-ZHLS) in Network Simulations 2 (NS2) with mobile nodes. As the mobility rate changes and the topology size changes, it can be seen that the detection rate of black holes and malicious nodes is extremely high, the average delay is reduced, and the packet delivery rate is increased compared to the Zone-Based Hierarchical Link State Routing Protocol (ZHLS).
Timely emerging research technology increases the need for real-time applications in Wireless Sensor Networks (WSN), which has made quality-based communication protocols an interesting and hot research topic. More specifically, network protocols must cope with power constraints while providing accurate quality assurance. In many of these applications, network traffic consists of delay-sensitive traffic and delay-tolerant traffic. Therefore, Quality of Service (QoS) routing becomes an important issue. The main purpose of this idea is to develop a way to improve the quality of the network and further improve throughput while at the same time creating an energy-saving method with excellent quality of service. This paper proposes to model an Energy Efficient Qualitative Routing Protocol (EEQRP) method based on an energy-efficient protocol that can be used to develop a fast, miniaturized, more energetic, and efficient way than existing routing protocols. It evaluates and compares the performance of the routing protocol (EEQRP). The Network Simulator-2 (NS2) is used to run and test the proposed system, which provides lower average latency, greater power savings, and a higher packet delivery rate than the current protocol.
Energy efficiency continues to be a key factor limiting the ability to deploy ad-hoc networks. Deploying an energyefficient system that maximizes network lifetime has been a major challenge for many years. Many algorithms have been proposed to solve this problem. This paper proposes a new intrusion detection system—Enhanced Adaptive 3 Acknowledgment (EA3ACK)—using the Energy Efficiency Dynamic State (EEDS) algorithm. This algorithm is designed to increase network lifetime and residual energy by constantly monitoring individual nodes in the network, thereby improving the network's quality of service. The Network Simulator (NS2) is used to implement and test the proposed system.
Due to the mobility of the nodes, the topology often changes, causing the link to fail. Lack of infrastructure support and limited resources are the main causes of dishonest and uncooperative nodes, and in finding a route to a destination and opening new routes. As a result of the frequent discovery, there is large network congestion that occurs. Multipath routing protocols are designed to find multiple routes to a target, and switch to a backup secondary path if the primary route is violated to avoid this. These protocols also provide better routing performance and security. This paper examines two ondemand MANET protocols, a Trusted Secure Dynamic Source Routing (TS-DSR) and a Modified Trusted Secure Dynamic Source Routing (MTS-DSR), as well as a mechanism for gateway discovery on demand.
Wireless Sensor Networks (WSN) have expanded significantly over the past few decades as a result of recent developments in Wireless Communication technologies. Many innovative architectures, protocols, algorithms, and applications have been proposed and implemented. Routing protocols that directly affect the lifetime of a network have a significant impact on the efficiency of these networks. One of the most commonly used and preferred methods for routing operations is Clustering. Swarm Optimization techniques such as the Nature inspired Artificial Bee Colony (ABC) algorithm have been successfully used to solve a variety of Optimization problems in Wireless Sensor Networks. The ABC algorithm is discussed in this paper, along with its various applications, and some improvements to the ABC algorithm are also reviewed.