Open Access   Article Go Back

Emergency Data Transmission for Disaster Planning in MANETs

M.P. Virgin Mary1

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 119-125, Feb-2019

Online published on Feb 28, 2019

Copyright © M.P. Virgin Mary . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M.P. Virgin Mary , “Emergency Data Transmission for Disaster Planning in MANETs,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.119-125, 2019.

MLA Style Citation: M.P. Virgin Mary "Emergency Data Transmission for Disaster Planning in MANETs." International Journal of Computer Sciences and Engineering 07.04 (2019): 119-125.

APA Style Citation: M.P. Virgin Mary , (2019). Emergency Data Transmission for Disaster Planning in MANETs. International Journal of Computer Sciences and Engineering, 07(04), 119-125.

BibTex Style Citation:
@article{Mary_2019,
author = {M.P. Virgin Mary },
title = {Emergency Data Transmission for Disaster Planning in MANETs},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {119-125},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=733},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=733
TI - Emergency Data Transmission for Disaster Planning in MANETs
T2 - International Journal of Computer Sciences and Engineering
AU - M.P. Virgin Mary
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 119-125
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

Wireless Ad-hoc Networks encompass variety of nodes that communicate with one another over a wireless channel that have numerous forms of networks, device networks, ad-hoc networks, and so on. The most drawback in these channels is expounded to security as a result of the secure communication, a very important side of any networking setting, is associate particularly vital challenge in spontaneous networks. A reliable system for such message exchanges is considered to be a particular strength for such organizations. Information security is a more general concern for officers of the armed forces and armed forces personnel is in constant pursuit of better procedures to ensure data protection and integrity. Privacy is needed in Ad-hoc networks. A secured on demand position based private routing algorithm is proposed for communication and which provides a security in Mobile Ad-hoc Network. This proposed is used for security to prevent message hacking information from internal & external attackers.

Key-Words / Index Term

Wireless Network, Ad-hoc Network, secure message transmission, secure message communication

References

[1] Papadimitratos, P. Haas, Z.J, “Secure data communication in mobile ad-hoc networks”, This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: Feb. 2006, Volume: 24, Issue: 2, On page(s): 343- 356.
[2] Reza Curtmola Cristina Nita-Rotaru, “BSMR: Byzantine- Resilient Secure Multicast Routing in Multihop Wireless Networks”, IEEE Transactions on Mobile Computing, vol. 8, Issue. 4, pp. 445 - 459, February 2009.
[3] A.Tsirigos and Z.J.Hass (2004), “Analysis of multipath routing, Part 1: The effects on the packet delivery ratio” IEEE Transactions on Wireless Communication., vol.3, no.2, pp: 500-511
[4] Banner, R. Orda, A, “Multipath Routing Algorithms for Congestion Minimization”. This paper appears in: Networking, IEEE/ACM Transactions on Publication Date: April 2007 Volume: 15, Issue: 2, on page(s): 413-424.
[5] P.Papadimitratos and Z.J.Hass, “Secure Routing for Mobile Ad Hoc Networks”, in proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS-2002).
[6] Papadimitratos, P. Haas, Z.J and E.G.Sirer, “Path set selection in mobile ad hoc Networks”,in Proc 3rd ACM MobiHoc, Lausanne, Switzerland, Jun 2002 ,pp 1-11.
[7] J. G. Jetcheva and D. B. Johnson, “Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks.” In Proc. of MobiHoc, 2001, pp. 33–44.
[8] L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” in Advances in Ultra-Dependable Distributed Systems. IEEE Computer Society Press, 1995.
[9] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad-hoc networks,” in Proc. of CNDS, January 2002, pp. 27–31.