Main Article Content

M. Anusuya


Wireless protocol is the load control method to be used on the zig bee method. The replace the cable by the personal area network on the flow of the various loads .the communication are transfer on the interconnection on the flow of the data.DHCP –Dynamic host Control protocol.Power load monitoring System. The usage and service options of a public network generally differ from a private (enterprise or home) network and consequently, the two networks are often configured differently. The existence of both types of networks motivates our need to improve support and management of nomadic users who frequently roam between them furthermore; our solution can be used to scale networks that are deployed in a large setting. This paper discuss in detail the various issues that need to be dealt with for achieving true device-level mobility, pointing out several unsolved problems in this area. The algorithms and software proposed in this paper have been implemented, are deployed, and are currently being used in a real-world public network that is operational at the Crossroads Mall in Bellevue, Washington.


Download data is not yet available.

Article Details



T.X. Brown, J.E. James, A. Sethi, "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks", Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 120-130, 2006.

M. Cagalj, S. Capkun, J.-P. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks", IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.

A. Chan, X. Liu, G. Noubir, B. Thapa, "Control Channel Jamming: Resilience and Identification of Traitors", Proc. IEEE Int'l Symp. Information Theory (ISIT), 2007.

T. Dempsey, G. Sahin, Y. Morton, C. Hopper, "Intelligent Sensing and Classification in Ad Hoc Networks: A Case Study", IEEE Aerospace and Electronic Systems Magazine, vol. 24, no. 8, pp. 23-30, Aug. 2009.

Y. Desmedt, "Broadcast Anti-Jamming Systems", Computer Networks, pp. 223-236, Feb. 2001.

K. Gaj, P. Chodowiec, Cryptographic Engineering, pp. 235-294, 2009.

T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006.

M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proceedings of WiSec, 2011.

W. Xu, W. Trappe, Y. Zhang, and T.Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of MobiHoc, pages 46–57, 2005.

Akyildiz, I. F., Wang, W., & Wang, W. (2005, January). Wireless mesh networks: a survey. Computer Networks Journal, 47(4), 445-487. [6] D. Stinson. Cryptography: theory and practice. CRC press, 2006.

Eriksson, J. and Koivunen, V.: Identi¯ability, separability, and uniqueness of linear ica models. IEEE Signal Processing Letters, 11(7), July 2004.[8] P. Tague, M. Li, and R. Poovendran. Mitigation

Denning, D., and Denning, P.J.: 'Data security', ACM Comput. Surveys, 1979, 11, pp. 227-250 [2] A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with JayshreeUllal, senior VP of Cisco.