i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 10 Issue 2 January - June 2022

Research Paper

Different Parameters of Topology-Based Wireless Acknowledgements in MANETS

K. Thamizhmaran*
Department of Electronics and Communications Engineering, Government College of Engineering, Bodinayakkanur, Theni, India.
Thamizhmaran, K. (2022). Different Parameters of Topology-Based Wireless Acknowledgements in MANETS. i-manager’s Journal on Wireless Communication Networks, 10(2), 1-7. https://doi.org/10.26634/jwcn.10.2.18933

Abstract

The nodes are connected by wireless channels and form a random topology. This paper focuses on a new Intrusion Detection System (IDS), Secure-Enhanced Adaptive 3 Acknowledgment (S-EA3ACK), using Enhanced Adaptive ACKnowledgment (EAACK) with hybrid cryptography specifically designed for Mobile Ad Hoc Networks (MANET). In addition, all the aforementioned protocols are compared based on several important performance metrics such as Packet Delivery Ratio (PDR), end-to-end latency, and average power consumption across Network Simulator 2 (NS2), which are used to implement and test the proposed system. Different topology sizes and node sets were used, and the results were compared to those of some closely related IDS mechanisms.

Research Paper

On-Demand Based Wireless with Hybrid Cryptography in MANET

V. Rajesh Kannan *
Assistant Professor, Annamalai University, Tamil Nadu, India
Kannan, V. R. (2022). On-Demand Based Wireless with Hybrid Cryptography in MANET. i-manager’s Journal on Wireless Communication Networks, 10(2), 8-14. https://doi.org/10.26634/jwcn.10.2.18937

Abstract

The self-configuring ability of nodes in Mobile Adhoc Network (MANETs) made it popular among critical applications like military use or natural emergency recovery. Most of the proposed protocols assume that all nodes in the network are cooperative, and do not address any security issue. To adjust such trend, it is vital to address its potential security issues. The main objective of this paper is to define the path for security and to further improve delay, energy, throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security. In this paper, performance analysis of hybrid cryptography with reactive protocol Elliptic Curve Cryptography - Ad hoc On- Demand Distance Vector Routing (ECC-AODV) designed for MANET. In this design there is a two key encryption technique based on elliptic curve based theory that can be used to create faster, smaller, and more energetic and efficient cryptography. Network Simulator (NS2) is used to implement and test the proposed system.

Research Paper

Comparative Study of Different Types of Microstrip Patch Antennas for RFID

Astha Singh* , Devanshi Srivastava**, Samreenbano***, Soumya Tiwari****, Vidhi Srivastava *****, Jitendra Shukla******, Yatindra Gaurav*******
*-******* Institute of Engineering and Rural Technology, Prayagraj, Uttar Pradesh, India.
Singh, A., Srivastava, D., Samreenbano, Tiwari, S., Srivastava, V., Shukla, J., and Gaurav, Y. (2022). Comparative Study of Different Types of Microstrip Patch Antennas for RFID. i-manager’s Journal on Wireless Communication Networks, 10(2), 15-19. https://doi.org/10.26634/jwcn.10.2.18766

Abstract

In this paper, An soft High-Frequency Structure Simulator (HFSS) software is used to create microstrip patch antennas in three different shapes, including round, triangular, and hexagonal. The antennas are constructed using FR4 epoxy material with a dielectric constant of 4.4 and a thickness of 1.6 mm. Various performance measures of these antennas, including return loss, gain, and bandwidth, are compared. All of these antennas are tuned to operate at 2.45 GHz. The circular microstrip patch antenna was found to perform better at this frequency than any other form.

Research Paper

Quality of Service (QoS) Based Wireless Network for Mobile Ad Hoc Networks

A. Charles*
Department of Electronics and Communication Engineering, Annamalai University, Chidambaram, Tamil Nadu, India.
Charles, A. (2022). Quality of Service (QoS) Based Wireless Network for Mobile Ad Hoc Networks. i-manager’s Journal on Wireless Communication Networks, 10(2), 20-25. https://doi.org/10.26634/jwcn.10.2.18934

Abstract

Quality of Service (QoS) requirements are possible with actual transmission of updates for wireless applications typically included in mission critical applications such as military use or disaster recovery. This research paper proposes an efficient Secure Quality Oriented Distributed (S-QOD) Secure Enhanced Adaptive 3 Acknowledgment (S-EA3ACK) and implements a new on-demand wireless intrusion detection system. S-QOD can improve a best performance of output quality (QoS) to reduce transmission delay, transmission time and also increase network communication throughput for S-EA3ACK using Enhanced Adaptive Acknowledgement (EAACK) DSA (Digital Signature Algorithm) with MAJE4 symmetric cryptography specially designed for MANET through Network Simulator-2.34 (NS2) to implement it.

Research Paper

Cluster Head Selection Wireless Communication for MANET

K. Thamizhmaran* , G. Girishkumar**
* Department of Electrical and Communication Engineering, Government College of Engineering, Bodinayakkanur, Theni, India.
** Department of Electrical and Electronics Engineering, Government Polytechnic College, Kooduveli Village, Kattumannarkoil Taluk, Cuddalore, Tamil Nadu, India.
Thamizhmaran, K., and Girishkumar, G. (2022). Cluster Head Selection Wireless Communication for MANET. i-manager’s Journal on Wireless Communication Networks, 10(2), 26-32. https://doi.org/10.26634/jwcn.10.2.18932

Abstract

In this paper, an economical method for replacing each cluster is additionally designed. It uses this method as an associate's Central Management Server (CMS), and its main goal is to improve performance by reducing the everchanging CH topology. The CH method is used in the 2-head rule network to avoid any kind of offensive model and also to avoid latency and energy. This will make the node even faster. The Network Simulator 2 (NS 2) is used to simulate the predictive rule and compare it with the Weight-based Cluster (WBC), Primary and Secondary Weight-based Cluster (PSWBC). The designed cluster methodology implemented in the test system ensures secure transmission and further reduces routing, delay, and power overhead, improving topology efficiency.