Work place: Department of Computer Science Engineering, Thapar University, Patiala - 147004, India
E-mail: tarunpreetbhatia@gmail.com
Website:
Research Interests: Information Security, Network Architecture, Network Security
Biography
Tarunpreet Bhatia is currently working as lecturer in CSED at Thapar University, Patiala. She received her B. Tech from ACE, Kurukshetra University and M.E. from Thapar University, majoring in Computer science and engineering. She has published many papers in referred journals and conferences (India and Abroad). Her research interests include wireless networks, routing, network security and cloud computing.
By Tarunpreet Bhatia A.K. Verma
DOI: https://doi.org/10.5815/ijcnis.2015.09.08, Pub. Date: 8 Aug. 2015
The primary concern for the deployment of MANET is to promote flexibility, mobility and portability. This mobility causes dynamic change in topology and poses challenges for designing routing algorithms. In the past few years, many ad hoc network protocols have been developed and research is still going on. It becomes quite difficult to say which protocols may perform well under different network scenarios such as varying network size, mobility of nodes and network load etc. This paper analyzes the performance of proactive protocols like DSDV, OSLR, reactive protocols like AODV, DSR and hybrid protocol such as ZRP. The analysis guides us to the evaluation of various performance metrics such as throughput, packet delivery fraction, normalized routing load and average end to end delay under different scenarios such as varying network size, speed of the node and pause time. The focus of this paper is to have quantitative analysis to guide which protocol to choose for specified network and goal.
[...] Read more.By Tarunpreet Bhatia A.K. Verma
DOI: https://doi.org/10.5815/ijcnis.2013.12.05, Pub. Date: 8 Oct. 2013
Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals