CFP last date
20 May 2024
Reseach Article

A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks

by M.balaganesh, D.balagowri, P.sathiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 3
Year of Publication: 2015
Authors: M.balaganesh, D.balagowri, P.sathiya

M.balaganesh, D.balagowri, P.sathiya . A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks. International Journal of Computer Applications. 109, 3 ( January 2015), 23-26. DOI=10.5120/19170-0640

@article{ 10.5120/19170-0640,
author = { M.balaganesh, D.balagowri, P.sathiya },
title = { A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 3 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { },
doi = { 10.5120/19170-0640 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:43:50.846126+05:30
%A M.balaganesh
%A D.balagowri
%A P.sathiya
%T A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 3
%P 23-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Wireless networking protocols square measure progressively being designed to use a user's measured channel condition. Every user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to see however resources square measure allotted to users. In a channel-aware protocol, each individual user's reportable channel condition affects the performance of every alternative user. A doable attack against channel aware protocols is not an accurate feedback of channel condition. The preparation of channel-aware protocols will increase the risks exhibit by false feedback. In this paper, study the potential impact of associate offender that incorrectly reports its channel condition and propose a defense reaction to firmly estimate channel condition. Tend to analyze the mechanism and judge the system performance deploying the mechanism through simulation.

  1. E. , Aazhang, B, "Improving uplink capacity via user cooperation diversity,"IEEE Trans. Mobile Computing, vol. 2, no. 2, pp. 161-173, Apr. -June 2003.
  2. H. Luo, R. Ramjee, P. Sinha, L. E. Li, and S. Lu, "Ucan: a unified cellular and ad-hoc network architecture," in Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 353–367, ACM Press, 2003.
  3. J. Gomez, A. T. Campbell, M. Naghshineh, and C. Bisdikian, "PARO: Supporting Dynamic Power Controlled Routing in Wireless Ad Hoc Networks,"WirelessNetworks,vol. 9, no. 5, pp. 443-460, 2003.
  4. N. Agarwal, L. Chandran-Wadia, and V. Apte. Capacity analysis of the GSM short message service. In NationalConference on Communications, 2004.
  5. Padovani, R. , Pankaj, R. (2000) 'Data throughput of cdma-hdr a high efficiency high data rate personal communication wireless system' pp. 353–36
  6. P. Mutaf and C. Castelluccia. Insecurity of the paging channel in the wireless internet: A denial-of-service attack that exploits dormant mobile IP hosts. In 3rd Workshop on Applications and Services in Wireless Networks, 2003.
  7. P. Viswanath, D. Tse, , and R. Laroia. Opportunistic Beamforming using Dumb Antennas. IEEE Transactions on Information Theory, 48:1277–1294, June 2002.
  8. R. Knopp and P. Humblet. Information capacity and power control in single-cell multiuser communications. In Proceedings of the ICC, 1995.
  9. R. , Sinha, P. , Li, L. E. , Lu, S, "Ucan: a unified cellular and adhoc network architecture,"Proc. ACM MobiCom, pp. 134-146, 2003.
  10. S Soshant Bali1, Sridhar Machiraju2, Hui Zang2, and Victor Frost1. Scheduler-Based Attacks in third generation Wireless Networks. Technical Report RR06- ATL-040624, Sprint ATL, 2006.
  11. S. Singh and C. Raghavendra, "PAMAS—Power Aware MultiAccess Protocol with Signalling for Ad Hoc Networks,"ACM Computer Comm. Rev. ,vol. 28, pp. 5-26, 1999.
  12. S. Singh, M. Woo, and C. S. Raghavendra, "Power-Aware Routing in Mobile Ad Hoc Networks," Proc. ACM MobiCom,Oct. 1998.
  13. Telecommunications Industry Association. CDMA 2000: High Rate Packet Data Air Interface Specification (TIA-856-A), 2004.
  14. Tse, D. N. C. , Laroia, R "Opportunistic beam forming using dumb antennas,"IEEE Comm. Magazine,vol. 39, no. 6, pp. 138-147, June 2001.
  15. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge, 1 edition, 2005.
  16. W. Wei, C. Zhang, H. Zang, J. Kurose, and D. Towsley. Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks. In Proc. of PAM, 2006.
  17. X. Li, H. Chen, Y. Shu, X. Chu, and Y. -W. Wu, "Energy Efficient Routing with Unreliable Links in Wireless Networks,"Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '06),pp. 160-169, 2006
  18. X. Liu, E. K. P. Chong, and N. B. Shroff. A framework for opportunistic scheduling in wireless networks. Computer Networks, 41(4):451–474, March 2003.
  19. X. -Y. Li, Y. Wang, H. Chen, X. Chu, Y. Wu, and Y. Qi, "Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links,"IEEE Trans. Parallel and Distributed Systems,vol. 20, no. 10, pp. 1408-1421,Oct. 2009.
Index Terms

Computer Science
Information Sciences


Channel-aware wireless communication