Research Paper | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015
Optimization of an Error Minimizing or Localizing Jammers in Wireless Networks
Abstract: Wireless networks have already grown considerably and will certainly go on doing so, consequently the security and secrecy has become a critical issue. Earlier research efforts have mostly solved this problem (i) efficient detection and elimination of cheating node, (ii) range-based localization without using radio coverage and (iii) range-based localization in the presence of cheating node. The proposed system guarantees an upper bound on the localization jamming error. Most of the malicious node detection techniques are based on consensus building or geometric estimation, and are rather restrictive with high false-positive or false-negative rate. In this paper is the design and implementation of an efficient and lightweight jamming localization algorithm. Our technique control scheme guarantees stability robustness to multiple jamming nodes in different channels and changeful presented bit-rate (PBR) bandwidth. It also achieves two expectant goals, i. e. it ensures convergence of queue length to the desired steady-state value and satisfies a weighted fairness condition. The higher priority queue results in reducing the input delay of packets which results in traffic control mechanisms, the scheduling is assigned on FIFO scheduling mechanisms. The algorithm good performance of jamming location. Simulation results show that the control system is rapid, robust, and adaptive and the quality of service (QOS) is guaranteed.
Keywords: Mobile Ad Hoc Networks, jamming aware traffic allocation, multipath source routing, optimization CDMA
Edition: Volume 4 Issue 2, February 2015,
Pages: 1705 - 1709
How to Cite this Article?
S. Rajeswari, "Optimization of an Error Minimizing or Localizing Jammers in Wireless Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1705-1709, https://www.ijsr.net/get_abstract.php?paper_id=SUB151214
How to Share this Article?
Similar Articles with Keyword 'Mobile Ad Hoc Networks'
Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana | Sandeep Gupta 
Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood
Pranita D. Pandit | Prof. Pranjali Deshmukh