|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 109 - Issue 3 |
| Published: January 2015 |
| Authors: M.Balaganesh, D.Balagowri, P.Sathiya |
10.5120/19170-0640
|
M.Balaganesh, D.Balagowri, P.Sathiya . A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks. International Journal of Computer Applications. 109, 3 (January 2015), 23-26. DOI=10.5120/19170-0640
@article{ 10.5120/19170-0640,
author = { M.Balaganesh,D.Balagowri,P.Sathiya },
title = { A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks },
journal = { International Journal of Computer Applications },
year = { 2015 },
volume = { 109 },
number = { 3 },
pages = { 23-26 },
doi = { 10.5120/19170-0640 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2015
%A M.Balaganesh
%A D.Balagowri
%A P.Sathiya
%T A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks%T
%J International Journal of Computer Applications
%V 109
%N 3
%P 23-26
%R 10.5120/19170-0640
%I Foundation of Computer Science (FCS), NY, USA
Wireless networking protocols square measure progressively being designed to use a user's measured channel condition. Every user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to see however resources square measure allotted to users. In a channel-aware protocol, each individual user's reportable channel condition affects the performance of every alternative user. A doable attack against channel aware protocols is not an accurate feedback of channel condition. The preparation of channel-aware protocols will increase the risks exhibit by false feedback. In this paper, study the potential impact of associate offender that incorrectly reports its channel condition and propose a defense reaction to firmly estimate channel condition. Tend to analyze the mechanism and judge the system performance deploying the mechanism through simulation.