Professional Documents
Culture Documents
References: Its Applications, 5, 7, Pp. 139-172
References: Its Applications, 5, 7, Pp. 139-172
40
REFERENCES
1. Johnson,D.B., D.A.Maltz, and J. Broch, (2001). The Dynamic Source Routing Protocol for Multihop Ad Hoc Networks, International Journal of Network Security & its Applications, 5, 7, pp. 139-172.
2.
Chan,S.P., R.Poovendran, and M.T.Sun, (2002). A Key-Management Scheme for Distributed Networks, Proceedings of the 9th ACM conference on Computer and communications security, 2, 8, pp. 90-100.
3. Rahman,A.H. and Zukarnain,Z.A, (2009). Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks, European Journal of Scientific Research, 31, 4, pp. 566-576.
4.
Du,W. and N.Memon, (2005). A Pairwise Key Predistribution Scheme for Wireless Sensor Network, ACM Information and Security Journal, 8, 2, pp. 228-258.
5.
Jain,K.(2004). Security Based on Network Topology Against the Wiretapping Attack, Journal on Computer Science and Network Security, 11, 1, pp. 68-71.
6.
Ning,P. and R.Li,(2005). Establishing Pairwise Keys in Distributed Sensor Networks, European Journals, 8, 1, pp. 41-77.
40
Raman,S. et al, (2010).Wireless sensor networks: A Survey of Intrusions and their Explored Remedies, International Journal of Engineering Science and Technology, 2, 5, pp. 962-969.
8.
Royer,E.M. and C.E.Perkins,(1999). Ad Hoc On-Demand Distance Vector Routing, Math of Operations Research Journal, 7, 4, pp. 515-531.
9.
Schurgers,C. and M.B.Srivastava,(2001). Energy Efficient Routing in Wireless Sensor Networks, International Journal on Communications, 7, 9, pp. 357-361.
10.
Tague,P. and R.Poovendran,(2008). Vulnerability of Network Traffic Under Node Capture Attacks, Proceedings of IEEE Workshop Network Security, Florida, 22, 11, pp. 612-613.
TABLE OF CONTENTS
Pa ges Table of Contents.. i List of Tables. ii NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE
40
Chapters 1. 2. 3. 4. 5. INTRODUCTION. 1 LITERATURE SURVEY.. 5 SYSTEM ANALYSIS 15 SYSTEM DEVELOPMENT.. 19 PROJECT IMPLEMENTATION.. 27 36 37
CONCLUSION REFERENCES
LIST OF TABLES
Tables 1. 2. Hardware Specifications Software Specifications. Pages 19 25
40
LIST OF FIGURES
Figures 1.The Client Server Model 2.Use Case Diagram.. 3.Login Form. 4.Menu Form 5.Unicast Server 6.Unicast Client 7.Multicast Server 8.Multicast Client. 9.Sender form.. 10. 11. Routing Analysis Simulation Graphical Representation..
Pages 27 29 30 31 32 32 33 34 35 36 36