Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

ANALYSIS OF NETWORK TRAFFIC

40

REFERENCES
1. Johnson,D.B., D.A.Maltz, and J. Broch, (2001). The Dynamic Source Routing Protocol for Multihop Ad Hoc Networks, International Journal of Network Security & its Applications, 5, 7, pp. 139-172.

2.

Chan,S.P., R.Poovendran, and M.T.Sun, (2002). A Key-Management Scheme for Distributed Networks, Proceedings of the 9th ACM conference on Computer and communications security, 2, 8, pp. 90-100.

3. Rahman,A.H. and Zukarnain,Z.A, (2009). Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks, European Journal of Scientific Research, 31, 4, pp. 566-576.

4.

Du,W. and N.Memon, (2005). A Pairwise Key Predistribution Scheme for Wireless Sensor Network, ACM Information and Security Journal, 8, 2, pp. 228-258.

5.

Jain,K.(2004). Security Based on Network Topology Against the Wiretapping Attack, Journal on Computer Science and Network Security, 11, 1, pp. 68-71.

6.

Ning,P. and R.Li,(2005). Establishing Pairwise Keys in Distributed Sensor Networks, European Journals, 8, 1, pp. 41-77.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

ANALYSIS OF NETWORK TRAFFIC 7.

40

Raman,S. et al, (2010).Wireless sensor networks: A Survey of Intrusions and their Explored Remedies, International Journal of Engineering Science and Technology, 2, 5, pp. 962-969.

8.

Royer,E.M. and C.E.Perkins,(1999). Ad Hoc On-Demand Distance Vector Routing, Math of Operations Research Journal, 7, 4, pp. 515-531.

9.

Schurgers,C. and M.B.Srivastava,(2001). Energy Efficient Routing in Wireless Sensor Networks, International Journal on Communications, 7, 9, pp. 357-361.

10.

Tague,P. and R.Poovendran,(2008). Vulnerability of Network Traffic Under Node Capture Attacks, Proceedings of IEEE Workshop Network Security, Florida, 22, 11, pp. 612-613.

TABLE OF CONTENTS
Pa ges Table of Contents.. i List of Tables. ii NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

ANALYSIS OF NETWORK TRAFFIC List of Figures ii Acknowledgements iii Synopsis. iv

40

Chapters 1. 2. 3. 4. 5. INTRODUCTION. 1 LITERATURE SURVEY.. 5 SYSTEM ANALYSIS 15 SYSTEM DEVELOPMENT.. 19 PROJECT IMPLEMENTATION.. 27 36 37

CONCLUSION REFERENCES

LIST OF TABLES
Tables 1. 2. Hardware Specifications Software Specifications. Pages 19 25

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

ANALYSIS OF NETWORK TRAFFIC

40

LIST OF FIGURES

Figures 1.The Client Server Model 2.Use Case Diagram.. 3.Login Form. 4.Menu Form 5.Unicast Server 6.Unicast Client 7.Multicast Server 8.Multicast Client. 9.Sender form.. 10. 11. Routing Analysis Simulation Graphical Representation..

Pages 27 29 30 31 32 32 33 34 35 36 36

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

You might also like