Open Access Open Access  Restricted Access Subscription or Fee Access

Reduction of Delay in Multicast Protocol

Devanshi Soni

Abstract


As an improvement we consider information security alongside this correspondence situation with the assistance of Advanced Encryption Standard [AES] calculation, which encodes the information utilizing 256 piece encryption procedure and decodes the information once it achieves the goals. For all our whole work obviously expresses that the disappointment free Quality of Service [QoS] empowered multicast directing situation and accomplishing high security with the assistance of AES calculation and in addition lessening the postponement and expanding the throughput over system condition.


Keywords


Wireless Communication, AES, Blackhole, MRA. AODV.

Full Text:

PDF

References


Wen, Weimin, et al. "Energy Efficient Data Collection Scheme in Mobile Wireless Sensor Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE, 2017.

Chen, Yu-Hsun, et al. "A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs." IEEE Systems Journal (2017).

Zou, Yulong, Xianbin Wang, and Weiming Shen. "Physical-layer security with multiuser scheduling in cognitive radio networks." IEEE Transactions on Communications 61.12 (2013): 5103-5113.

Xiao, Bin, Bo Yu, and Chuanshan Gao. "CHEMAS: Identify suspect nodes in selective forwarding attacks." Journal of Parallel and Distributed Computing 67.11 (2007): 1218-1230.

Zhang, Yu, Loukas Lazos, and William Kozma. "AMD: Audit-based misbehavior detection in wireless ad hoc networks." IEEE transactions on mobile computing 15.8 (2016): 1893-1907.

Ren, Ju, et al. "SACRM: Social aware crowdsourcing with reputation management in mobile sensing." Computer Communications 65 (2015): 55-65.

Yu, Lean, et al. "Time series forecasting with multiple candidate models: selecting or combining." Journal of Systems Science and Complexity 18.1 (2005): 1-18.

Ren, Ju, et al. "Exploiting channel-aware reputation system against selective forwarding attacks in WSNs." Global Communications Conference (GLOBECOM), 2014 IEEE. IEEE, 2014.

Chaubey, Ravi Prakash, and Nitesh Gupta. "Enhanced Multicast routing for QoS in delay tolerant networks." (2017).

Khan, Rais, and Anilkumar Vishwakarma. "Enhancement of manet routing protocol." IT in Business, Industry and Government (CSIBIG), 2014 Conference on. IEEE, 2014.

I. Butun and R. Sankar, “A Brief Survey of Access Control in Wireless Sensor Networks,” in Proc. IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, January 2011.

I. Butun, Y. Wang, Y. Lee and R. Sankar, “Intrusion prevention with two–level user authentication in heterogeneous wireless sensor networks”, International J. Security and Networks, vol. 7, no. 2, pp. 107–121, 2012.

S. Sen and J.A. Clark, “Evolutionary computation techniques for intrusion detection in mobile ad hoc networks”, Elsevier J. Computer Networks, vol. 55, num. 15, pp. 3441–3457, 2011.

M. Wei and K. Kim, “Intrusion detection scheme using traffic prediction for wireless industrial networks”, IEEE J. Communications and Networks, vol. 14, num. 3, pp. 310–318, 2012.

C. Wang, T. Feng, J. Kim, G. Wang and W. Zhang, “Catching Packet Droppers and Modifiers in Wireless Sensor Networks”, IEEE Trans.Parallel Distrib. Syst., vol. 23, num. 5, pp. 835–843, 2012.

Y. Zou, Y.-D. Yao, and B. Zheng, “Cooperative relay techniques for cognitive radio systems: spectrum sensing and secondary user transmissions,” IEEE Commun. Mag., vol. 50, no. 4, pp. 98–103. Apr. 2012.

Y. Zou, X. Wang, and W. Shen, “Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack,” in Proc. 2013 IEEE Intern. Conf. Commun., pp. 1–5.

Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physicallayer

security in cooperative wireless networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099–2111, Oct. 2013.

L. Lu, X. Zhou, U. Onunkwo, and Y. Li, “Ten years of research in spectrum sensing and sharing in cognitive radio,” EURASIP J. Wireless

Commun. and Net., vol. 2012, Jan. 2012.

Y. Zou, Y.-D. Yao, and B. Zheng, “Cognitive transmissions with multiple

relays in cognitive radio networks,” IEEE Trans. Wireless Commun., vol.

, no. 2, pp. 648–659, Feb. 2011.

F. Bao, R. Chen, M.J. Chang and J.H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trustbased routing and intrusion detection”, IEEE Trans. Network Service

Management, vol. 9, num. 2, pp. 169–183, 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.