Imparting a Quality Service and Traffic analysis for Monitoring Information in Mobile Wireless Networks

Raghupatruni Manikanteswara Rao, M Dhanalaxmi

Abstract


Privacy and security have emerged as an important research issue in mobile Networks wireless communication, Mobile device based data scattering applications that use these abilities. This paper proposes TurfCast, a novel data spread administration that specifically communicates data specifically "turfs," conceptual coherent spaces in which beneficiaries are arranged. Such turfs can be transient or spatial in view of recipients' waiting time or physical zones, individually. TurfCast has numerous applications, for example, electronic nearness promoting and mobile long range interpersonal communication. The individuals who can't get data sufficiently quick get none by any stretch of the imagination, regardless of the possibility that they wait close to the supporter. Numerous secrecy improving strategies have been proposed in view of packet encryption to ensure the communication obscurity of mobile systems. To exhibit how to find the communication designs without unscrambling the caught packets, we show TurfCast. It works latently to perform traffic investigation in view of statistical qualities of caught crude traffic. These are fit for finding the sources, the goals, and the conclusion to-end communication relations. Exact analysiss show that accomplishes great precision in uncovering the shrouded traffic designs.


Keywords


Anonymity enhancing techniques, mobile ad-hoc networks, point-to-point transmission, statistical traffic pattern analysis

References


P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Transactions on Information Theory, vol. 46, no. 2, pp. 388 – 404, 2000.

A. E. Gamal, J. Mammen, B. Prabhakar and D. Shah, “Throughput-Delay Trade-off in Wireless Networks,” Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, vol.1, 2004.

802.11e IEEE Std. Inform. Technol.–Telecommun. and Inform. Exchange Between Syst.-Local and Metropolitan Area Networks-Specific Requirements Part II: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 8: Medium Access Control (MAC) Quality Service Enhancements, IEEE 802.11 WG, 2005.

Wei Liu, Nishiyama, Ansari, Jie Yang, Kato, "ClusterBased Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks", IEEE Transactions on Parallel and Distributed Systems, Vol.24, No.2, pp. 239 - 249, 2013.

Yang Qin, Dijiang Huang, Bing Li, "STARS: A Statistical Traffic Pattern Discovery System for MANETs", IEEE Transactions on Dependable and Secure Computing, Vol.11, No.2, pp. 181 – 192, 2014.

L. Romdhani, Q. Ni, and T. Turletti, “Adaptive EDCF: Enhanced service differentiation for IEEE 802.11 wireless ad-hoc networks,” in Proc. Wireless Commun. Networking Conf., vol. 2. New Orleans, LA, 2003, pp. 1373–1378.

J. L. Sobrinho and A. S. Krishnakumar, “Quality-ofservice in ad hoc carrier sense multiple access wireless networks,” IEEE J. Select. Areas Commun., vol. 17, no. 8, pp. 1353–1368, Aug. 1999.

C.-H. Yeh and T. You, “A QoS MAC protocol for differentiated service in mobile ad hoc networks,” in Proc. Int. Conf. Parallel Process., Kaohsiung, Taiwan, Oct. 2003, pp. 349–356.

S. Sivavakeesar and G. Pavlou, “Quality of service aware MAC based on IEEE 802.11 for multihop ad hoc networks,” in Proc. IEEE Wireless Commun. Networking Conf., vol. 3, Atlanta, GA, Mar. 2004, pp. 1482–1487.

A. Chen, Y. T. L. Wang Su, Y. X. Zheng, B. Yang, D. S. L. Wei, and K. Naik, “Nice - a decentralized medium access control using neighbourhood information classification and estimation for multimedia applications in ad hoc 802.11 wireless lans,” in Proc. IEEE Int. Conf. Commun., May 2003, pp. 208–212.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.