Open Access   Article Go Back

TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS

PM. Shanthi1 , A. Dalvin Vinoth Kumar2 , M. Edison3 , A. Aloysius4

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 21-24, Mar-2018

Online published on Mar 31, 2018

Copyright © PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius, “TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.21-24, 2018.

MLA Style Citation: PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius "TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS." International Journal of Computer Sciences and Engineering 06.02 (2018): 21-24.

APA Style Citation: PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius, (2018). TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS. International Journal of Computer Sciences and Engineering, 06(02), 21-24.

BibTex Style Citation:
@article{Shanthi_2018,
author = {PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius},
title = {TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {21-24},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=198},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=198
TI - TNLIQ: Trust Validation in Ad-Hoc Networks using Dynamic Location Identification to ensure QoS
T2 - International Journal of Computer Sciences and Engineering
AU - PM. Shanthi, A. Dalvin Vinoth Kumar, M. Edison, A. Aloysius
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 21-24
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

MANET system is a sort of remote system, is self-designing frameworks less system gadgets are associated by remote. The gadgets of MANET organize is allowed to move freely toward any path that is the reason connecting with whatever other gadgets is effectively done. Each must forward movement random to its own particular utilize, and consequently be a switch. The essential objective of Mobile specially appointed system is every gadget to consistently keep up the data required to appropriately course movement. This paper discuss about the path loss in ad-hoc environment to compute path to destination. Current location and identified location to identify attacker node to ensure QoS. The packet loss is reduced and results of RREQ utilization is calculated using network scenarios.

Key-Words / Index Term

MANET, Energy efficiency, Link Failure, AODV, Dalwi-AODV

References

[1] Shenbagapriya, R., and Kumar Narayanan. "An efficient proactive source routing protocol for controlling the overhead in mobile ad-hoc Networks." Indian Journal of Science and Technology 8.30 (2015): 1.
[2] A. Dalvin Vinoth kumar and L. Arockiam, Route Discovery Overhead Aware Routing Protocol for IoT to Enhance QoS, I J C T A, 9(27), 2016, pp. 249-254.
[3] Kumar, A. Dalvin Vinoth, PD Sheba Kezia Malarchelvi, and L. Arockiam. "CALDUEL: Cost And Load overhead reDUction for routE discovery in LOAD ProtocoL." Advances in Computer and Computational Sciences. Springer, Singapore, 2017. 229-237.
[4] Chen, Byron H., Maria E. Palamara, and Charles Varvaro. "Local positioning system." U.S. Patent No. 6,748,224. 8 Jun. 2004.
[5] Foster, Ian, et al. "End-to-end quality of service for high-end applications." Computer Communications 27.14 (2004): 1375-1388.
[6] Rastegar, Mohammad, Mahmud Fotuhi-Firuzabad, and Farrokh Aminifar. "Load commitment in a smart home." Applied Energy 96 (2012): 45-54.
[7] Kikinis, Dan. "System for controlling processing of data passing through network gateway between two disparate communications network." U.S. Patent No. 6,603,762. 5 Aug. 2003.
[8] Kumar, A. Dalvin Vinoth, A. Vithya Vijayalakshmi, and L. Arockiam. "TENSOR: A Technique to Enhance IoT Data Security using Bluetooth Low Energy Network for Smart Home Environment." (2017).
[9] Ko, JeongGil, et al. "Evaluating the Performance of RPL and 6LoWPAN in TinyOS." Workshop on Extending the Internet to Low Power and Lossy Networks Vol. 80. 2011 pp. 85-90
[10] Liu, C., Wu, K., & He, T. (2004, October). Sensor localization with ring overlapping based on comparison of received signal strength indicator. In Mobile Ad-hoc and Sensor Systems, 2004 IEEE International Conference on (pp. 516-518).
[11] Parssinen, Aarno, Jussi Vepsalainen, and Pauli Seppinen. "Method and apparatus for continuously controlling the dynamic range from an analog-to-digital converter." U.S. Patent No. 6,993,291. 31 Jan. 2006.
[12] Shanthi, P. M., A. Dalvin Vinoth Kumar, and L. Arockiam. "A Technique to Enhance Quality of Service using weighted Path Mechanism." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol 4, no. 2, (2017), pp. 413-417.
[13] Unde, Mahadev G., and Bansidhar E. Kushare. "Analysis of Electromagnetic Fields of 1200kV UHV-AC Transmission Lines." Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on. IEEE, 2013.
[14] Loehr, Jim, James E. Loehr, and Tony Schwartz. The power of full engagement: Managing energy, not time, is the key to high performance and personal renewal. Simon and Schuster, 2005.
[15] Hu, Ningning, and Peter Steenkiste. "Evaluation and characterization of available bandwidth probing techniques." IEEE journal on Selected Areas in Communications 21.6 (2003): 879-894.