Mobile Ad hoc Networks (MANETs) are a subclass of remote network system having exceptional characteristics of dynamic system topology and moving nodes. The utilization of remote advances is expanding and it impacts in the improvement of new hypotheses and structures for the interchanges. One of these new advancements is the portable systems. The routing is a fundamental part in the achievement of the secure communication in these structures. Routing method is the basic and essential execution factor in the Mobile Ad-hoc Network. The routing methods in MANET are practiced to deal with much number of nodes with limited resources. There is an assortment of routing method exist in MANET. Because of the dynamic topology and non-framework, network members collaborate with their neighbors to route the data packets. Cryptographic methodologies have been familiar with secure gathering for example, Private and Public Key Infrastructure. The self-governing and circulated nature of MANETs requests a decentralized validation administration, where Public Key Infrastructure is viewed as a superior arrangement. Key administration in the MANET is a critical issue concerning the security of the network communication. By setting up key administration technique, arrangement can be given to administrations like confirmation, information respectability and information classification. Secure routing and information transmission have an important role in Ad Hoc system as it is increasingly defenseless against numerous attacks because of its auxiliary qualities. In this paper, a survey is done on different routing methods, secure communication process and methods to improve the unwavering quality of information transmission.
The problem of smart agriculture has been well studied and the security in Wireless Sensor Networks (WSN) has been analyzed in detail. There are a number of approaches discussed in the literature to support the growth of agriculture by considering different factors. But still the performance of plant management is not up to the expected level in terms of plant management and security concern. To handle these issues, an efficient multi view image based plant management technique which consider color and contrast features to obtain the features of fluid, plant, climate to compute different supportive measures like Fluid Specific Growth Support (FSGS), Plant Specific Growth Support (PSGS) and Climate Specific Growth Support (CSGS) measures to compute the value of Plant Growth Measure (PGM) and Crop Yield Measure (CYM). Also, using the same support measures, the presence of diseased plants is identified and fertilizers are regulated accordingly. Similarly, the wireless sensor network has been used as monitoring environment which has several routes to monitor different locations of agriculture lands. The presences of different routes are monitored for the transmission of different agriculture data. To handle the security issues, a low rate attack detection scheme is presented which finds the routes and for each route the method computes Service centric Legitimate Support (SCLS) to find low rate attacks. Similarly, the data security by controlling different smart devices in agriculture lands is enforced by using service centric data encryption (SCDE) scheme which uses different encryption scheme and keys to encrypt the data being used for controlling the devices of agricultural lands. The proposed method improves the performance of smart agriculture and improves the data security with higher low rate detection accuracy.
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer's position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.