Loading...
  • Home
  • Search Results
559-560 of 4327 Papers

DESIGN AND SIMULATION OF MICROSTRIP PATCH ANTENNA FOR ON-BODY COMMUNICATION USING DIFFERENT FEEDING TECHNIQUES

Published In: SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER ENGINEERING
Author(s): NAVDEEP KAUR , RAJNI

Abstract: The Body Area Network (BAN) is an area which helps constant monitoring of Human health with real-time updates of medical records through Internet. In this paper, we propose an on-body performance of wearable Microstrip patch antenna which operates in Industrial scientific Medical (ISM) frequency band at 2.45 GHz. This antenna is designed to achieve better return loss gain and bandwidth. The antenna return loss is about -25.54 db with microstrip feed and -22.68 db with coaxial feed at 2.45 GHz. Another field parameters like Gain, Directivity, Radiation and Specific Absoption Rate (SAR) values have been evaluated on the body and on free space antenna with FEM based software HFSS ver. 10.0.

  • Publication Date: 13-Jun-2013
  • DOI: 10.15224/978-981-07-6935-2-61
  • Views: 0
  • Downloads: 0

RESOLVING BLACK HOLE ATTACK IN AODV USING PROPOSED INTRUSION DETECTION SYSTEM

Published In: SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER ENGINEERING
Author(s): ANANT VERMA, , MUKESH AZAD , ROHIT PAL , SANJAY KUMAR

Abstract: Ad hoc networks are characterized by open medium, dynamic topology, distributed cooperation and constrained capability with more challenges for security. Routing security is the most important factor in the security of the entire network. However, few of current routing protocols have the consideration about the security problems. This paper emphasizes on the black hole attack in the AODV protocol. To provide security in AODV protocol, firstly we have to trace malicious behavior of node. Specially, we analyzed the black hole node behavior and proposed a security system to detect such black hole node in the network and made the secured system that optimizes the loss of packets from such type of attack.

  • Publication Date: 13-Jun-2013
  • DOI: 10.15224/978-981-07-6935-2-62
  • Views: 0
  • Downloads: 0