Sharada Valiveti

Learn More
In recent years ad hoc networks are widely used because of mobility and open architecture nature. But new technology always comes with its own set of problems. Security of ad hoc network is an area of widespread research in recent years. Some unique characteristics of ad hoc network itself are an immense dilemma in the way of security. In this paper we have(More)
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. So many approaches are proposed for Ad-Hoc Networks for dealing with various attacks. Trust based mechanism coupled with Ad Hoc Networks based(More)
An Ad hoc Network consists of a set of autonomous mobile nodes that communicates via multi-hop wireless communication in an infrastructure-less environment. In such a network group communication takes place by implementing a multicasting technique. This multicasting technique is intended to provide energy and bandwidth efficiency with secure content(More)
These days, Ad Hoc Networks are in demand in some crucial applications due to their open architecture and the mobility feature. Here, nodes cooperate with each other for communication. This very characteristic poses an immense problem in Ad Hoc Networks from the Security Point of view. Also due to the lack of Central Administration, Ad Hoc Networks fall(More)
A Mobile Ad Hoc Network (MANET) is a self configuring infrastructureless network of mobile nodes connected by wireless links. Hence, routing in this kind of networks is a great challenge. Ant Colony Optimization is an algorithm to solve problems like routing in MANETs based on food searching behavior of ants. AntHocNet is based on ideas from Ant Colony(More)
In a wireless sensor network deployed in remote area, because of no rechargeable energy source available, the network lifetime is critically dependent on how efficiently the energy resources are used. Clustering is powerful technique to use energy efficiently. Meta-heuristic methods can be applied for clustering. In this paper, different meta-heuristic(More)
IoT can be defined as new technology for new generation which improves our daily life using some tiny devices, sensor nodes which are connected to each other through Internet. We can easily operate our home appliance using IoT at anytime and anywhere. But the main issue behind IoT based communication is security. Secure communication between all devices is(More)
The nodes in Mobile Ad-hoc Network(MANET) interacts with one another within the absence of any centralized authority by that the Security is the one of the major problem in MANET. The various security schemes against attack are upgrade the network performance in presence of assaulter to disable misbehavior activity .In this paper we tend to examine the(More)