11 th International Conference on Mobile & Wireless Networks (MoWiN 2022) is dedicated to address the challenges in the areas of wireless & mobile networks. The conference looks for significant contributions to the Wireless & Mobile... more
11 th International Conference on Mobile & Wireless Networks (MoWiN 2022) is dedicated to address the challenges in the areas of wireless & mobile networks. The conference looks for significant contributions to the Wireless & Mobile computing in theoretical and practical aspects. The Wireless & Mobile computing domain emerges from the integration among personal computing, networks, communication technologies, cellular technology and the Internet Technology. The modern applications are emerging in the area of mobile ad hoc networks and sensor networks. This conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc and sensor networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & Mobile computing concepts and establishing new collaborations in these areas.
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to... more
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster formation and cluster head election. However, in WCA security features are not included. The proposed TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The simulation result confirms the efficiency of our scheme than the WCA and SEMC.
ASTPP is an Open Source VoIP billing solution for Freeswitch. It supports pre-paid and post-paid billing with call rating, credit control and call reporting. It also provides many other features such as calling cards, least cost routing... more
ASTPP is an Open Source VoIP billing solution for Freeswitch. It supports pre-paid and post-paid billing with call rating, credit control and call reporting. It also provides many other features such as calling cards, least cost routing (LCR), did management, reseller management etc.
the main Theme of this project entitled communication on Adhoc (VLAN) Network is to design and implement a telephony program that uses Wi-Fi in LAN as means of communication between mobile phones. The technology for creating mobile campus... more
the main Theme of this project entitled communication on Adhoc (VLAN) Network is to design and implement a telephony program that uses Wi-Fi in LAN as means of communication between mobile phones. The technology for creating mobile campus network via Wi-Fi. The VLAN is a wireless local area network (VLAN) links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. The technology of Mobile Virtual LAN, where multiple Mobiles used to create mobile network via Wi-Fi is discussed. In this mobile Wireless network , the single mobile is configured as Server and rest of Mobile phones as clients. The implementation goals includes the several features including, file sharing, browsing and push message notification etc.
This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole / grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack multiple nodes collude to hide the... more
This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole / grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to detect. In this paper a survey of various security mechanisms that have been proposed in the literature for diction of such attacks is presented.
This paper describes the implementation process of the Free Technologies Open Laboratory (LATL) in the Center for Information Technology Renato Archer (CTI) under the approach of 5W1H framework. The actions of adoption, use and... more
This paper describes the implementation process of the Free Technologies Open Laboratory (LATL) in the Center for Information Technology Renato Archer (CTI) under the approach of 5W1H framework. The actions of adoption, use and development of ICT by governs remain controversial between daily practice and legislation pro free technologies. The implementation of LATL aims to provide means to promote and empower government units in the use and development of free technologies and open standards for documents and data. The application of 5W1H model proved useful in the definition and evaluation of the actions of cause and effect in the implementation process of the laboratory. Resumo. Este artigo descreve o processo de implantação do Laboratório Aberto de Tecnologias Livres (LATL) no Centro de Tecnologia da Informação Renato Archer (CTI) sob o enfoque do modelo 5W1H. As ações de adoção, uso e desenvolvimento de TIC por governos continuam sendo controversas entre a prática vigente e a legislação pró tecnologias livres. A implantação do LATL visa proporcionar meios para promover e capacitar unidades de governo no uso e desenvolvimento de tecnologias livres e padrões abertos para documentos e dados. A aplicação do modelo 5W1H mostrou-se útil na definição e avaliação das ações de causa e efeito do processo de implantação do laboratório.
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the last decade. it surrounded by much challenges that should be solved the improve establishment of such networks. Failure of wireless... more
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the last decade. it surrounded by much challenges that should be solved the improve establishment of such networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the network internal structure will be unpredictably changed frequently according to continuous activities between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This model puts the functionality of routing operation in crucial angle in the area of research under mobile ad-hoc network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are designed for mobile ad-hoc networks by describing their structures, operations, features and then comparing their various characteristics.