Preeti Nagrath

Learn More
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a Anonymity but an authenticated selfish node can infer to(More)
Digital watermarking is referred to a method used for copyright protection and authentication. In this paper, we present a method of nested digital watermark embedding and extraction in which a nested watermark (a watermark inside another watermark) is embedded into the main image. This concept of nested watermarking is used to increase the watermark(More)
Ad hoc network allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol for ad hoc network operate in an ad hoc fashion, as on demand routing protocol often have low overhead and faster reaction time than other type of routing based on periodic protocol.(More)
Probabilities and social behaviour are two common criteria used to route a message in disruption/delay tolerant network wherein there is only intermittent connectivity between the nodes. In this article we first discuss how the characteristics of these routing algorithms can be exploited by a malicious node to attract data packets and then dropping them to(More)
Delay tolerant networks (Barun Saha, http://delay-tolerant-networks.blogspot.in ) are the networks that address the technical issues in heterogeneous network that may lack continuous network connectivity. A message is forwarded to a node if it has higher delivery predictability than the current node for that particular destination. But there obviously(More)
  • 1