Security Contribution in Wireless Communication Networks
Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 2)Publication Date: 2020-02-05
Authors : Anurag Chandana;
Page : 255-258
Keywords : Security is one of the most important concepts in ad hoc networks. It has been observed that different protocols need different strategies for security. The study here proposes a theory in this paper;
Abstract
Fading and multi path occur in many wireless communication systems. In mobile communication systems, the mobile or the base station unit is often surrounded by various objects, such as buildings, trees, etc. These objects produce more than one path over which the signal can travel between the transmitter and the receiver. In multi path situation, the signals arriving along different paths will have different attenuation, delays and direction of arrivals. They might add at the receiving end either constructively or destructively depending on their phases, resulting in phenomena known as fading. A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Mostly work has been concentrated on routing aspect. Most of the protocols in this category are not incorporating proper security features. Security is one of the most important concepts in ad hoc networks. It has been observed that different protocols need different strategies for security. The study here proposes a theory in this paper based on Hashing as a tool. This scheme can make most of the on demand protocols secure. The study should help in making protocols more robust against attacks and standardize parameters for security in routing protocols.
Other Latest Articles
- Role of Financial Ratios in the Economy
- Role of Library in Technical Education with Reference to Chhattisgarh
- The Utilization of Social Media as a Main Business Platform in a Small Developing Country: A Case Study of SMEs in Brunei Darussalam
- Measuring Decisions: A Proposal for Quantitative Study in Forensic Handwriting Examination
- Nymber Server in Anonymizing Network: A Review
Last modified: 2021-06-27 15:43:04