Shashank Tyagi

Learn More
Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online's data policy on reuse of materials please consult the policies page. Abstract. The success of pervasive computing depends on the ability to compose a multitude of networked applications(More)
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol. Many routing protocols for such networks have been proposed so far. The most popular ones are Dynamic Source Routing (DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV) routing protocol.(More)
42 Abstract—In wireless sensor networks nodes have several limitations such as limited battery life, low computational capability, short radio transmission range and small memory space. However, the most severe constraint of the nodes is their limited energy resource because they cease to function when their battery has been depleted. To reduce energy usage(More)
The purpose of this paper is to carry out study on delay minimization techniques of data transmission, which is a major Quality-of-service (QoS) parameter in Mobile ad-hoc network (MANET). Various algorithms that are given in the study of previous investigators have been considered and analyzed and a tabulated summary work has been carried out. Related(More)
A Mobile Ad-Hoc Network (MANET) is a temporary network that is composed of the mobile devices which communicates through wireless links without any pre-existing infrastructure. Routing is one of the major concerns in the MANET due to its frequent changing topology and the absence of centralized administrator. In this paper, we evaluate the performance of(More)
— It is widely recognized that data security will play a central role in the design of future IT system. Elliptic key cryptography recently gained lot of attention in industries when we talk about security. This paper discusses the basic operation how ECC is more secure than other public key cryptosystems and also how security can be enhanced in ECC by(More)
Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre existing fixed infrastructure. Because of highly dynamic in nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing(More)
  • 1