•  
  •  
 

International Journal of Smart Sensor and Adhoc Network

Volume 2, Issue 2 (2012)

Articles

PDF

User Authentication Techniques for Wireless Sensor Networks : A Survey
Shakera Shaikh and Veena Gulhane
DOI: 10.47893/IJSSAN.2012.1142

PDF

An Approach To Detect The Wormhole Attack In Vehicular Adhoc Networks
Harbir Kaur, Sanjay Batish, and Arvind Kakaria
DOI: 10.47893/IJSSAN.2012.1143

PDF

EFFICIENT AND SECURE AUTHENTICATION BY USING 3-PATH TRANSMISSION IN AD HOC NETWORKS
VETRI SELVI . S and PURUS HOTHAMAN
DOI: 10.47893/IJSSAN.2012.1144

PDF

Energy-Efficient MAC Protocol for Wireless Sensor Networks - A Review
Smriti Joshi and Anant Kr. Jayswal
DOI: 10.47893/IJSSAN.2012.1147

PDF

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System
V M. Chavan, M M. Kuber, and R J. Mukhedkar
DOI: 10.47893/IJSSAN.2012.1148

PDF

HAKI-NFC BASED ANDROID APPLICATION
JAIKISHAN KHATWANI, ABHISHEK SINGH, HRISHIKESH RANGDALE, KAMLESH JUWARE, and ISHAN ALONE
DOI: 10.47893/IJSSAN.2012.1150

PDF

FAULT TOLERANCE IN WIRELESS SENSOR NETWORKS USING CONSTRAINED DELAUNAY TRIANGULATION
RAMNESH DUBEY, SANTOSH KUMAR SWAIN, CHANDRA PRAKASH KASHYAP, and RAJESH BERA
DOI: 10.47893/IJSSAN.2012.1151

PDF

OPTIMAL ROUTE SELECTION STRATEGY FOR QOS IMPROVEMENT
MANJHARI JAIN, AKHILESH A. WAOO, P. S. Patheja, and SANJAY SHARMA
DOI: 10.47893/IJSSAN.2012.1152

PDF

RECONFIGURABLE SELF-ADDRESSABLE MEMORY-BASED FSM A SCALABLE INTRUSION DETECTION ENGINE
B. SRILATHA and KRISHNA KISHORE
DOI: 10.47893/IJSSAN.2012.1153

IJSSAN Cover Art