 Open Access
				Open Access 
				 Subscription or Fee Access
									Subscription or Fee Access
							Construction of Clustering in Adhoc Network
Abstract
Keywords
References
Mukesh Chand ,HL MandoriaG. “Partition in mobile adhoc network with mobility-A new approach for effective use of fast IP address autoconfiguration,” International Journal of Engineering and Technology, vol.4No 6Dec 2012-Jan 2013, pp. 419-425.
C.-H. Choi, H.-J. Lim, T.-K. Kim, G.-H. Im, and V. B. Lawrence, “Spectral efficient multiuser technique with channel-dependent resource allocation schemes,” IEEE Transactions on Wireless Communications, vol. 11, no. 3, pp. 990–999, 2012. View at Publisher · View at Google Scholar · View at Scopus
W. Vereecken, W. Van Heddeghem, M. Deruyck et al., “Power consumption in telecommunication networks: Overview and reduction strategies,” IEEE Communications Magazine, vol. 49, no. 6, pp. 62–69, 2011. View at Publisher ·
Jung-Chun Kao,Radu Marculescu “Minimizing Eavesdropping Risk by Transmission Power Control In Multihop Wireless Networks”Transactions on Computer.Vol 56.No.8 August 2010.
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck” Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks” IEEE/ACM Transaction on networking, VOL. 17, NO. 6, December 2009
M.L.Younis, K.Chumman and M.Eltoweissy, ”Location-Aware Combinational Key Management Scheme for Clustered Sensor Networks,” IEEE Trans. Parallel and Distributed Systems. Vol. 17 no8.pp865-882,Aug 2006.
Zdnet, Smart worm lies low to evade detection, http://news.zdnet.co.uk/internet/security/0,39020375, 9160285,00.htm.,
Refbacks
- There are currently no refbacks.
 
	This work is licensed under a Creative Commons Attribution 3.0 License.
 
 
  
  
  
  
  Email this article
			Email this article