Veltech Drrr Drsr Technical University

India

Veltech Drrr Drsr Technical University

India
SEARCH FILTERS
Time filter
Source Type

Keerthika,Veltech Drrr & Drsr Technical University | Malarvizhi,Veltech Drrr & Drsr Technical University
IIOAB Journal | Year: 2016

Mobile Ad hoc Networks (MANETs)are self-configuring networks with nodes being connected through wireless links forming a multi-hop radio network without infrastructure or administration. Security is a major issue in MANETs due to dynamically changing topologies, lack of centralized monitoring, open medium, and bandwidth constraints. It faces security issues not addressed by the security services of infrastructure based networks. Routing performance deteriorates in MANETs due attacks. Ad hoc On-demand Distance Vector (AODV) is a suitable MANET routing protocol that is highly vulnerable to black hole attack by malicious nodes. This study simulates/analyses the impact of black hole attack on an AODV protocol. © 2016, Institute of Integrative Omics and Applied Biotechnology. All rights reserved.


Hemapriya D.,Veltech Drrr Drsr Technical University | Deepan S.,Veltech Drrr Drsr Technical University | Durairaj K.,Veltech Drrr Drsr Technical University | Hariharan R.,Veltech Drrr Drsr Technical University
International Journal of Applied Engineering Research | Year: 2015

There are many data parallel computing frameworks such as Map Reduce and Hadoop to run data intensive applications but they exhibit interest locality which only sweep part of a big data set. In this paper, the enhancing of this data grouping with Bigdata distributed database is done which uses Index- Based Clustering of database and indexes all the clusters from different locations. It achieves anonymity with database by avoiding individual details towards traversing data. It sends only the necessary data rather than sending their personal details. It uses Admin system which has research pattern rights thus helps in authentication and trust for data before updating to the main database.It uses Hibernation which hits the database once in every time each set of process from login till log out. Each set of process will be stored as a object and hits the main database only once when complete set of work completed. Local system should have encrypted data so that nobody can get any individuals database. It uses database filter Ultimate Filter From Attacks (UFFA) for avoiding database attacks. © Research India Publications.

Loading Veltech Drrr Drsr Technical University collaborators
Loading Veltech Drrr Drsr Technical University collaborators