International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 160 | Views: 272 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Communications Engineering | India | Volume 9 Issue 2, February 2020 | Rating: 6.9 / 10


Security Contribution in Wireless Communication Networks

Anurag Chandana | Dr. Tripti Khatana


Abstract: Fading and multi path occur in many wireless communication systems. In mobile communication systems, the mobile or the base station unit is often surrounded by various objects, such as buildings, trees, etc. These objects produce more than one path over which the signal can travel between the transmitter and the receiver. In multi path situation, the signals arriving along different paths will have different attenuation, delays and direction of arrivals. They might add at the receiving end either constructively or destructively depending on their phases, resulting in phenomena known as fading. A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Mostly work has been concentrated on routing aspect. Most of the protocols in this category are not incorporating proper security features. Security is one of the most important concepts in ad hoc networks. It has been observed that different protocols need different strategies for security. The study here proposes a theory in this paper based on Hashing as a tool. This scheme can make most of the on demand protocols secure. The study should help in making protocols more robust against attacks and standardize parameters for security in routing protocols.


Keywords: Security is one of the most important concepts in ad hoc networks It has been observed that different protocols need different strategies for security The study here proposes a theory in this paper


Edition: Volume 9 Issue 2, February 2020,


Pages: 255 - 258


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top