A REVIEW OF ENERGY EFFICIENT NETWORK MODEL
Keywords:
Mobile cloud computing, Fiber Optics, AttenuationAbstract
in research paper, Mobile Cloud Computing and energy efficient model has been discussed. Mobile Cloud Computing work as a fuels convergence of mobile networks and cloud computing, solutions. It is giving power to users fore cast its mobile networks. It is offering on expect facilities. It has added mobile network operators and brilliant profits. Such solutions are supporting organizations as well as enterprise. It is enabling website and mobile developers. It is to comprehend applications with support of mobile networks. There are several researches in this field of mobile cloud computing that are also considered here. Proposed work does not focus only on boosting of network lifetime & growing packet delivery ratio, it also consider reduction of packet size proposed system is more secure as compared to traditional. Probability of congestion is less as compared to traditional. Overall performance gets boosted in case of proposed work at sender & receiver end. System would be beneficial for data transmission in military organization.
References
Aleksi Penttinen” RESEARCH ON AD HOC NETWORKING: CURRENT
ACTIVITY AND FUTURE DIRECTIONS” 2002
Yih-Chun Hu, Member” Wormhole Attacks in Wireless Networks” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
Robert J. Boncella :WIRELESS SECURITY: AN OVERVIEW” Communications of Association for Information Systems (Volume 9, 2002) 269-282
Yang, Qing & Lu, Rongxing & Challal, Yacine & Laurent, Maryline. (2017). Security and Privacy in Emerging Wireless Networks. Security and Communication Networks. 2017. 1-2. 10.1155/2017/5618742.
Ferdous, Raihana & Muthukkumarasamy, Vallipuram & Sattar, Abdul. (2010). Trust Management Scheme for Mobile Ad-Hoc Networks. 896 - 901. 10.1109/CIT.2010.167.
Ma, Di & Tsudik, Gene. (2010). Security and privacy in emerging wireless networks [Invited Paper]. Wireless Communications, IEEE. 17. 12 - 21. 10.1109/MWC.2010.5601953.
Lee.” Cryptanalysis of Lee–Lee authenticated key agreement scheme “Journal of Advances in Computer Networks, Volume 163, Issue 1, 5 April 2005, Pages 193-198
David Pointcheval,MihirBellare,PhillipRogaway "Authenticated Key Exchange Secure Against Dictionary Attacks" Lecture Notes in Computer Science Vol.,B. Preneel ed., Springer-Verlag, 2000.
Dr. Mahesh Kumar(2015) TCP & UDP packets analysis using wire shark International Journal of Science, Engineering and Technology Research, Volume 4, Issue 7, July 2015
KiranjitKaur, SandeepWaraich (2015) “Energy Efficient Wireless Sensor Networks based on Clustering Techniques”, International Journal of Computer Applications Volume 119 – No.11, June 2015
Al-Quzweeni, Taisir E.H. El-Gorashi, L. Nonde, and Jaafar M.H.(2015) “Energy Efficient Network Function Virtualization in 5G Networks”,
YousefEmami, Reza Javidan (2016) “An Energy-efficient Data Transmission Scheme in
Khandelwal, Divya. (2017). Underwater Wireless Sensor Network: A Review. 10.13140/RG.2.2.16973.74720.
Stefano Buzzi, Chih-Lin, Thierry E. Klein,(2016) “A Survey of Energy-Efficient mechanisms for 5G Networks and Challenges Ahead”,
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.