Downloading: Security Contribution in Wireless Communication Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

Security Contribution in Wireless Communication Networks

Anurag Chandana, Dr. Tripti Khatana

Abstract: Fading and multi path occur in many wireless communication systems. In mobile communication systems, the mobile or the base station unit is often surrounded by various objects, such as buildings, trees, etc. These objects produce more than one path over which the signal can travel between the transmitter and the receiver. In multi path situation, the signals arriving along different paths will have different attenuation, delays and direction of arrivals. They might add at the receiving end either constructively or destructively depending on their phases, resulting in phenomena known as fading. A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Mostly work has been concentrated on routing aspect. Most of the protocols in this category are not incorporating proper security features. Security is one of the most important concepts in ad hoc networks. It has been observed that different protocols need different strategies for security. The study here proposes a theory in this paper based on Hashing as a tool. This scheme can make most of the on demand protocols secure. The study should help in making protocols more robust against attacks and standardize parameters for security in routing protocols.

Keywords: Security is one of the most important concepts in ad hoc networks It has been observed that different protocols need different strategies for security The study here proposes a theory in this paper



Top