Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:3 Issue:1 Year: 26 June,2014 Pages:364-369
In the paper propose about topology security services in network process. the paper presents the association of a topology techniques and the modeling of topological network states. In terms of a linear integer programming optimization process for the network static state security. The proposed model is for the help of real-time network operators to ensure the security of the power system more efficiently and group authentication. Information and apply local neighbor selection policies to evolve the topology.
Topology link.optimized.
[1] L.Pengwei and X.Zhenqiang, Security Enhancement of AODV against Internal Attacks, International Conference on Information Science and Engineering (ICISE), Vol. 2, pp 584-586, 2010. [2] A.Das, S.S.Basu and A.Chaudhuri, A Novel security scheme for wireless Ad-hoc network, International Conference on Wireless Communication Vehicular Technology, Information theory and Aerospace and Electronic System technology, Vol. 2, pp 1-4, 2011. [3] DENG Hongmei, L I Wei and D P Agrawala, Routing Security in Wireless Ad Hoc Networks, International Journal of IEEE, Communication Magazine, Vol. 40(10), pp 70-75, 2002. [4] Parulpreet Singh, Ekta Barkhodia, Gurleen Kaur Walia, Performance Study of Different Routing Protocols(OLSR, DSR, AODV) Under Different Traffic Loads and with Same Number of Nodes, of Electronics & Communication, LPU, Phagwara, Vol. 3, Issue 1, Jan.- March 2012 [5] Park, V., Corson, S., Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification, IETF MANET Working Group Internet Draft. Draft-item-manet-TORA-spec-03.txt. November 2000. [6] Deep Kaur and Kirandeep Kaur “QoS in WLAN using IEEE 802.11e (Survey of QoS in MAC layer Protocols)” of SBS College of Engineering and Technology, Ferozepur, India, 2012 IEEE DOI 10.1109/ACCT.2012.93