A REVIEW OF ENERGY EFFICIENT NETWORK MODEL

Authors

  • Pratibha Research Scholar, Department of CSE, Technological Institute of Textile and Science,
  • Dr. Mukesh Kumar A.P., Department of CSE, Technological Institute of Textile and Science,

Keywords:

Mobile cloud computing, Fiber Optics, Attenuation

Abstract

in research paper, Mobile Cloud Computing and energy efficient model has been discussed. Mobile Cloud Computing work as a fuels convergence of mobile networks and cloud computing, solutions. It is giving power to users fore cast its mobile networks. It is offering on expect facilities. It has added mobile network operators and brilliant profits. Such solutions are supporting organizations as well as enterprise. It is enabling website and mobile developers. It is to comprehend applications with support of mobile networks. There are several researches in this field of mobile cloud computing that are also considered here. Proposed work does not focus only on boosting of network lifetime & growing packet delivery ratio, it also consider reduction of packet size proposed system is more secure as compared to traditional. Probability of congestion is less as compared to traditional. Overall performance gets boosted in case of proposed work at sender & receiver end. System would be beneficial for data transmission in military organization.

References

Aleksi Penttinen” RESEARCH ON AD HOC NETWORKING: CURRENT

ACTIVITY AND FUTURE DIRECTIONS” 2002

Yih-Chun Hu, Member” Wormhole Attacks in Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006

Robert J. Boncella :WIRELESS SECURITY: AN OVERVIEW” Communications of Association for Information Systems (Volume 9, 2002) 269-282

Yang, Qing & Lu, Rongxing & Challal, Yacine & Laurent, Maryline. (2017). Security and Privacy in Emerging Wireless Networks. Security and Communication Networks. 2017. 1-2. 10.1155/2017/5618742.

Ferdous, Raihana & Muthukkumarasamy, Vallipuram & Sattar, Abdul. (2010). Trust Management Scheme for Mobile Ad-Hoc Networks. 896 - 901. 10.1109/CIT.2010.167.

Ma, Di & Tsudik, Gene. (2010). Security and privacy in emerging wireless networks [Invited Paper]. Wireless Communications, IEEE. 17. 12 - 21. 10.1109/MWC.2010.5601953.

Lee.” Cryptanalysis of Lee–Lee authenticated key agreement scheme “Journal of Advances in Computer Networks, Volume 163, Issue 1, 5 April 2005, Pages 193-198

David Pointcheval,MihirBellare,PhillipRogaway "Authenticated Key Exchange Secure Against Dictionary Attacks" Lecture Notes in Computer Science Vol.,B. Preneel ed., Springer-Verlag, 2000.

Dr. Mahesh Kumar(2015) TCP & UDP packets analysis using wire shark International Journal of Science, Engineering and Technology Research, Volume 4, Issue 7, July 2015

KiranjitKaur, SandeepWaraich (2015) “Energy Efficient Wireless Sensor Networks based on Clustering Techniques”, International Journal of Computer Applications Volume 119 – No.11, June 2015

Al-Quzweeni, Taisir E.H. El-Gorashi, L. Nonde, and Jaafar M.H.(2015) “Energy Efficient Network Function Virtualization in 5G Networks”,

YousefEmami, Reza Javidan (2016) “An Energy-efficient Data Transmission Scheme in

Khandelwal, Divya. (2017). Underwater Wireless Sensor Network: A Review. 10.13140/RG.2.2.16973.74720.

Stefano Buzzi, Chih-Lin, Thierry E. Klein,(2016) “A Survey of Energy-Efficient mechanisms for 5G Networks and Challenges Ahead”,

Downloads

Published

30-06-2019

How to Cite

Pratibha, & Dr. Mukesh Kumar. (2019). A REVIEW OF ENERGY EFFICIENT NETWORK MODEL. International Journal for Research Publication and Seminar, 10(2), 62–66. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1257

Issue

Section

Original Research Article