Provide security for wireless mobile networks with different multiple access Techniques and MANET Network

  • Authors

    • E Uma Shankari
    • S Rajashekhar Reddy
    • P Aditya Sharma
    • G Geetha
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.11751
  • Mobile Ad Hoc network, 4th and 3rd generation CDMA, MIMO, Quality of service
  • The most recent versatile innovation of new features in mobile technology is needed for advancement of the Internet, for the features of better, quicker access of information. Cell division subscribers pay additional costs for instant messaging, stock quotes, and Furthermore easy internet access on their phones. In order to support such a capable system, we need pervasive, high-speed remote connectivity. Bluetooth and 802.11 are currently existing techniques for providing high speed digital wireless connectivity. The extension of 4G technology gave scope for mobile communications. Mobile is not only a portable talking gadget but also utilized for multiple distinctive purposes.4G offers higher data rates for consistent roaming. That portable mobile client might communicate without any disturbance due to network problems. In this process report we discuss different tests that 4G will facing and also gives the solutions for those problems. We recommend our own method for enhancing QoS On 4G eventually by utilizing both SMIP and SIP. We recommend that by utilizing such plan we might accomplish better QoS throughout that process of handover.

     

  • References

    1. [1] M. King and B. Zhu, “Gaming strategies,†in Path Planning to the West, vol. II, S. Tang and M. King, Eds. Xian: Jiaoda Press, 1998, pp. 158-176.

      [2] B. Simpson, et al, “Title of paper goes here if known,†unpublished.

      [3] J.-G. Lu, “Title of paper with only the first word capitalized,†J. Name Stand. Abbrev., in press.

      [4] M. Young, The Technical Writer’s Handbook, Mill Valley, CA: University Science, 1989.

      [5] Mitchell Ashley , “A Guide to Wireless Network Security†Information systems Control Journal ,Volume 3,2004.

      [6] Karen Scarfone, Derric Dicoi, “ Wireless Network Security for IEEE 802.11a/b/g,Bluetooth(DRAFT)â€,NISTPublication-800-48.Augest 2007.

      [7] Tom karygiannis, Les Owens, “Wireless Network Security for IEEE 802.11a/b/g,Bluetooth(DRAFT)â€,NISTPublication-800-48.November 2002

      [8] Ahmed M. Al Naamany , Ali Al Shidhani, Hadj Bourdoucen, “IEEE 802.11 Wireless LAN Security Overviewâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006.

      [9] Omar Cheikhrouhou & Maryline Laurent & Amin Ben Abdallah & Maher Ben Jemaa, “An EAP-EHash authentication method adapted to resource co

  • Downloads

  • How to Cite

    Uma Shankari, E., Rajashekhar Reddy, S., Aditya Sharma, P., & Geetha, G. (2018). Provide security for wireless mobile networks with different multiple access Techniques and MANET Network. International Journal of Engineering & Technology, 7(2.20), 57-60. https://doi.org/10.14419/ijet.v7i2.20.11751