Call for papers :

Submission Last Date 31/12/2017
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Energy Efficient Auto Protecting Nodes in Secured Data Transmission in MOBILE AD-HOC NETWORKs
Abstract
This research article tries an novel approach to find out the solution for Energy and Security related issues in MOBILE AD-HOC NETWORKs. This paper tries to evaluate two major properties of MOBILE AD-HOC NETWORKs which are very crucial for MANETs to serve energy efficient and secured communication among nodes. In this network all nodes are distributed with unique identification number and its battery or energy level. All nodes in the network are having a protocol to acknowledge the data sensor nodes after certain interval. In the first scenario, if any unauthorised node(s) tries to access this network then victim node anyhow will receive a acknowledge packet with crucial credential which is understood by the victim node(s) only, using this data , the victim node will take a secured path to send the data other than attacking node. In the second scenario, when a victim node tries to find out a central or immediate neighbour, before sending its data, the victim node will try to find the energy level of each neighbour and energy required for each communication, based on these criteria, the victim node will choose the neighbour for communication. Hence this proposal would be great helpful to MOBILE AD-HOC NETWORKs.
KeyWord
Energy, Ad Hoc, Self Protection, WIRELESS SENSOR NETWORK, Security
Others Details
Paper Id : 70822
Author Name : Chandrakant Naikodi
Volume/Issue No : Volume 04 Issue 10
Page No : 1-4
DOI Number : DOI:10.21090/IJAERD.70822
Publication Date : 2017-10-05
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406