A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers
Volume-2 | Issue-3
Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2
Fault Diagnosis in Hybrid Renewable Energy Sources with Machine Learning Approach
Volume-3 | Issue-3
Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme
Volume-2 | Issue-3
Stochastic Geometry and Performance Analysis of Large Scale Wireless Networks
Volume-3 | Issue-3
Computer Vision on IOT Based Patient Preference Management System
Volume-2 | Issue-2
Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4
A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique
Volume-3 | Issue-4
Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security
Volume-4 | Issue-3
Design an Early Detection and Classification for Diabetic Retinopathy by Deep Feature Extraction based Convolution Neural Network
Volume-3 | Issue-2
Design of an Intelligent Approach on Capsule Networks to Detect Forged Images
Volume-3 | Issue-3
Future Challenges of the Internet of Things in the Health Care Domain - An Overview
Volume-3 | Issue-4
Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2
A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
Volume - 1 | Issue - 1 | september 2019
Published
September, 2019
The autonomous mobile nodes framing an instantaneous network, utilizing the nearby available device that volunteer in establishing network is coined as the fly wire network. These adhoc type of network framed simultaneously are prone to various vulnerabilities, developing alterations in the information's or hacking of information's or the blocking of services. These security threats causing losses in the information transmitted, makes it necessary for the trust evaluation of the nodes to identify the selfish nodes. So the paper proposes the block chain trust management of nodes to avoid the vulnerabilities in the transmission path, enhancing the performance of the network. The performance of the proposed method is validated in the network simulator -II to ensure its capability in terms of the quality of service and the security (defense).
KeywordsFly networks Block chain Trust management Vulnerabilities Quality of service Defense enhancement
Full Article PDF Download Article PDF