International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-9  ( Sep, 2021 )
Past issues
  1. Volume-9,Issue-8  ( Aug, 2021 )
  2. Volume-9,Issue-7  ( Jul, 2021 )
  3. Volume-9,Issue-6  ( Jun, 2021 )
  4. Volume-9,Issue-5  ( May, 2021 )
  5. Volume-9,Issue-4  ( Apr, 2021 )
  6. Volume-9,Issue-3  ( Mar, 2021 )
  7. Volume-9,Issue-2  ( Feb, 2021 )
  8. Volume-9,Issue-1  ( Jan, 2021 )
  9. Volume-8,Issue-12  ( Dec, 2020 )
  10. Volume-8,Issue-11  ( Nov, 2020 )

Statistics report
Dec. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 104
Paper Published : 1332
No. of Authors : 3367
  Journal Paper


Paper Title :
A Method For Detecting Attacks On Delay Tolerant Network

Author :Sonika Gandhi, A.N. Jaiswal

Article Citation :Sonika Gandhi ,A.N. Jaiswal , (2014 ) " A Method For Detecting Attacks On Delay Tolerant Network " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 9-12, Volume-2,Issue-6

Abstract : Abstract- Delay tolerant network s (DTNs) is the one of the areas in the field of wireless communication, where in delay is particularly high. They are promising technology in vehicular, disaster response, under water and satellite networks. Delay tolerant networks characterized by large end to end communication latency and the lack of end to end path from a source to its destination and they pose several challenges to the security of DTNs. In the network layer there are many attacks so we consider most common types of attacks on mobile ad hoc networks. With the help of these attacks they give serious damages to the network in terms of latency and data availability. Using CAD algorithm motivated by the prior success of message passing techniques for decoding low-density parity-check codes over bipartite graphs. The proposed scheme provides high data availability and packet-delivery ratio with low latency in DTNs under various adversary attacks which attempt to both undermine the trust and detection scheme and the packet delivery protocol.

Type : Research paper

Published : Volume-2,Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-795   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 40
| Published on 2014-06-04
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY