7 research outputs found

    Secure Routing Environment with Enhancing QoS in Mobile Ad-Hoc Networks

    Get PDF
    A mobile adhoc network is infrastructure-free and self configured network connected without wire. As it is infrastructure-free and no centralized control, such type of network are suitable only for conditional inter communication link. So initially maintaining Quality of Service and security aware routing is a difficult task. The main purpose of QoS aware routing is to find an optimal secure route from source to destination which will satisfy two or more QoS constrain. In this paper, we propose a net based multicasting routing scheme to discovery all possible secure path using Secure closest spot trust certification protocol (SCSTC) and the optimal link path is derived from Dolphin Echolocation algorithm (DEA). The numerical result and performance analysis clearly describe that our provided proposal routing protocol generates better packet delivery ratio, decreases packet delay reduces overhead in secured environment

    Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet

    Full text link
    MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.Comment: https://aircconline.com/ijcnc/V15N2/15223cnc07.pd

    Trust Management: A Cooperative Approach Using Game Theory

    Get PDF
    Trust, defined as the willingness to accept risk and vulnerability based upon positive expectations of the intentions or behaviours of another. The qualities or behaviours of one person that create good expectations in another are referred to as trustworthiness. Because of its perceived link to cooperative behaviour, many social scientists regard trust as the backbone of effective social structures. With the advancement in technology, through these online social media people can explore various products, services and facilities. Through these networks the end users want to communicate are usually physically unknown with each other, the evaluation of their trustworthiness is mandatory. Mathematical methods and computational procedures do not easily define trust. Psychological and sociological factors can influence trust. End users are vulnerable to a variety of risks. The need to define trust is expanding as businesses try to establish effective marketing strategies through their social media activities, and as a result, they must obtain consumer trust. Game theory is a theoretical framework for analysing strategic interactions between two or more individuals, in the terminology of game theory, called players. Thus, a conceptual framework for trust evaluation can be designed using a game theory approach that can indicate the conditions under which trustworthy behaviour can be determined

    A Case of Difficult Extubation

    No full text
    The management of a case of difficult extubation due to inability to deflate the endotracheal tube cuff as a result of failure of pilot balloon assembly is presented. The importance of checking the endotracheal tube cuff and pilot system before adminis-tration of anaesthesia even in the case of a new endotracheal tube is emphasized

    Survey of Classification Based Prediction Techniques in Healthcare

    No full text
    corecore