This paper is published in Volume-4, Issue-6, 2018
Area
Networks
Author
Arun Kumar S.
Co-authors
Swetha S., Jayashree C. Y., Thriveni L., Bhuvanashree V., Renu R.
Org/Univ
Sapthagiri College of Engineering , Bengaluru, Karnataka, India
Pub. Date
20 December, 2018
Paper ID
V4I6-1383
Publisher
Keywords
AODV, DSR, JBATS

Citationsacebook

IEEE
Arun Kumar S., Swetha S., Jayashree C. Y., Thriveni L., Bhuvanashree V., Renu R.. To enhance the privacy protection in mobile Ad-hoc network using JBATS protocol, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Arun Kumar S., Swetha S., Jayashree C. Y., Thriveni L., Bhuvanashree V., Renu R. (2018). To enhance the privacy protection in mobile Ad-hoc network using JBATS protocol. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.

MLA
Arun Kumar S., Swetha S., Jayashree C. Y., Thriveni L., Bhuvanashree V., Renu R.. "To enhance the privacy protection in mobile Ad-hoc network using JBATS protocol." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.

Abstract

In Wireless Network, the privacy protection in the network is the prominent issue. Many protocols used to give privacy protection for the network and it uses the encoding and decoding approach to pass the data between one node to other nodes in a secure way. The cellular network will monitor the sensitive information in a protected way and also it is involved in the secure transmission of data. The JBATS protocol will give a better security in the network and it uses the encoding and decoding approach. This project mainly focuses on the protection for the JBATS protocol. The main aim of the project is to provide complete security compared to other similar protocol. The JBATS Protocol for mobile Ad-hoc network enhances the stronger privacy protection in the network. When compared with other protocol, JBATS (Just before Accepting and Transacting, Securing the data) provides effective performance includes the cost of computing, a delay between from one end to another end, and dropping of packets.
Paper PDF