Published March 2, 2024 | Version v1
Journal article Open

Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network

Authors/Creators

Description

The field of sensor network based wireless field (WSN) has attracted the interest of recent researchers because it is challenging to communicate via air medium due to issues with using the same carrier channel for all communication and because it is vulnerable to security issues such as malicious attacks, misbehavior attacks, block hole attacks, etc. Since it is difficult to find solutions for these limitations in a truest-based path, we devised and implemented the shortest first job scheduling algorithm with the aid of an infrastructure-less network. This leading approach solves the security challenge in wireless sensor networks above by determining the optimum unbreakable path in terms of both cost and distance between the transmitter and the receiver through simulation using NS2.

Files

Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network.pdf

Additional details

References

  • 1. Khamizhmaran, K. et al. (2012). Authentication and Intrusion Detection in MANET. International Journal of Advance Research in Technology, 3(3):15-21.
  • 2. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on industrial electronics, 60(3), 1089-1098.
  • 3. Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.
  • 4. Hespanha, J. P., Naghshtabrizi, P., & Xu, Y. (2007). A survey of recent results in networked control systems. Proceedings of the IEEE, 95(1), 138-162.
  • 5. Natsheh, E., Khatun, S., Jantan, A. B., & Shamala, S. (2008). Fuzzy metric approach for route lifetime determination in wireless ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput., 3(1), 1-9.
  • 6. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654..
  • 7. Rajkumar, M. (2013). Efficient Data Prediction Scheme using SVM Classification. In International Conference on Computer Science and Information Technology.
  • 8. Arivazhagan, A., Thamizhmaran, K., & Thamilselvi, N. (2015). Performance Comparison of on Demand Routing Protocols under Back whole For MANET. Advance Research in Computer science and software Engineering, 5(3), 407-411.
  • 9. Prabu, K., & Thamizhmaran, K. (2016). Cluster Head Selection Techniques and Algorithm for Mobile Ad-hoc Networks (MANETS). Advance Research in Computer science and software Engg, 6(7), 169-173.
  • 10. Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.