Padmaja, P. (57189218099) and E Justin Sophia, I. (57320736000) and Charan, Sai Hari (56045333800) and Kumar, Sunil Senthil (57220592072) and Somu, K. (57196425299) and Lingala, Thirupathi (57222668272) (2021) Distribute the message over the network using another frequency and timing technique to circumvent the jammers.
Full text not available from this repository.Abstract
The next wireless communication paradigm for network devices is mobile ad-hoc systems. In contrast to conventional mobile networks, networks will not have a wired connection. Providers ultimately rely on one another to maintain the network. The major uses for ad hoc networks remain the tactical military as well as other safety-sensitive activities. Its susceptibility to Denial-of-Service (DOS) assaults is one major problem in developing such systems. In this document, one kind of DOS assault, dubbed Jamming, is considered. An interference in lawful wireless technology is the goal of jamming. A jammer could do this by both avoiding transmitting a transmission from the true mobile user or through blocking valid packets from just being received. In this work, researchers present a novel way of measuring problematic areas to identify quite an assault. © 2021 Elsevier B.V., All rights reserved.
| Item Type: | Article |
|---|---|
| Subjects: | Immunology and Microbiology > Microbiology |
| Divisions: | Engineering and Technology > Vinayaka Mission's Kirupananda Variyar Engineering College, Salem > Electronics & Communication Engineering |
| Depositing User: | Unnamed user with email techsupport@mosys.org |
| Last Modified: | 11 Dec 2025 05:50 |
| URI: | https://vmuir.mosys.org/id/eprint/4564 |
