SlideShare a Scribd company logo
1 of 6
Download to read offline
David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA, NECO - 2013
pp. 369–374, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3538
SECURE & FAULT TOLERANCE HANDOFF
IN VANET USING SPECIAL MOBILE
AGENT
Shivani Jain1,
HimanshuTyagi2
, Charu Gupta3
2
Rajkumar Goel Institute of Technology for Women, Ghaziabad
1
Meerut Institute of Engineering &Technology, Meerut
3
ABES Engineering College, Ghaziabad
ABSTRACT
Vehicular Traffic poses an emerging issue nowadays. The critical factors for the data
communication are speed and time tradeoffs. For data communication, gathering and retrieving
information many cost-effective and tested techniques are required in VANET. Client server
architectures being coercive are commonly used in spite of having drawbacks of fault and time
in-effectiveness. This paper elaborates a proposed method in VANET for fault tolerance
information retrieval based on theory of bandwidth and timestamp. Mobile Agents, with the
feature of autonomy, social ability, learning, and most importantly mobility, regarded as an
appropriate technology to build applications for instance information retrieval system in mobile
computing environment.
KEYWORDS
VANET, Mobile agent, handoff.
1. INTRODUCTION
Vehicular Ad-Hoc network is an applied science which consists of moving vehicles as an
elementary node for the wireless networks to act as a mobile network. It is one of the wireless ad
hoc networks which allow communications between vehicles and close roadside equipments. It is
appearing as an uprising technology to combine recent generation wireless networking and
vehicles [1].VANET offers: (1) ubiquitous connectivity and (2) efficient vehicle-to-vehicle
communications which supports the Intelligent Transportation Systems (ITS) [1-3]. VANET’s
are desired to provide high speed and limited degrees of freedom in movement of nodes being
distributed, self constructing communication networks. To create high-presentation, extremely
measurable and secured technologies of VANET shows an unusual challenge like handoff to the
investigate community of wireless [9]. For the handoff mechanism and information retrieval, the
software that aims to provide mobility at the programming level is the Mobile Agent.
370 Computer Science & Information Technology (CS & IT)
A mobile agent is a program, which epitomize a user in a computer network, and is capable of
migrating independently from node to node, to perform some computation on behalf of the user.
MA is defined as objects that have behavior, state, and location [4]. Mobile code, and in
particular mobile agents, will be an essential tool for allowing such access. Mobile agents are
considered as a program, though they have some special properties that differentiate them from
the principal programs like mandatory and orthogonal (optional) properties [5-7]. Agents can
work without the human interruption or others, reactive or proactive decision making. Agents are
an active process which aims to achieve the end objectives.
The call should be transferred to the new cell’s base station while a vehicular node travels in a
cell (network) during the call else the call will be dropped. This mechanism is termed as handoff.
The handover process performed by introducing delays due to discovery, configuration,
authentication and binding update procedures associated with a mobility event [17, 18].
Consistent Handoffs (VHO) [10] between heterogeneous nodes in VANET required being fault
tolerant to provide smooth roaming, supporting service continuity and Quality of Service (QoS).
The network scenario and the basic functionalities required in the system for content request and
delivery [3]. The need to support such group operations is bringing together the requirements of
(i) a set of transport services that address the group paradigm and provide Quality of Service
based broadcast/multicast and the adequate level of fault tolerance, and, (ii), a broadcast/
multicast routing platform to efficiently route packets to the entire population of the network
nodes or to a subset [12]. Information retrieval (IR) defines the systems for identifying and
presenting documents to relate to mobile environment needs.
2. RELATED WORK
The two major issues in implementing the mobile agents in VANET were Agent naming
and mobility[3]. An agent should be uniquely defined that their communication should be
controlled during the travel in network [13]. Quality of service (QoS) is the assessment of a
service provided by the network to the end user. The more deterministic network performance
could be achieved with the mobile agents, so that information processed by the network can be
better conveyed and network resources can be effectively used. Qualities of Service (QoS)
management parameters are important for alleviating multimedia services in a network. A typical
QoS architecture should support the following: configuration, prediction, and management of
QoS at all the levels of abstraction (user, system and network level); management, control, and
processing of a flow must be distinct activities; application must be transparent from
establishment and management; asynchronous resource management of different components;
and performance enhancement. An agent based QoS architecture do supports all these features
[14]. Mobile agents can better address these issues in VANET [1-3]. In this technique, we
propose an intelligent agent based network that can be provides [3].
In paper [15], for the MA based handoff in wireless network, it is very important to employ the
call admission control (CAC) mechanism in the mesh router. First, call admission control is a
critical step for the provision of QoS guaranteed service In this paper, a proportional threshold
based optimal access bandwidth policy for CAC on the mesh router is deployed, which adopts
threshold structure and gives handoff calls and new calls different priorities. In paper [15], the set
of all possible proportional threshold structured CAC policies can be described as a space of all
possible CAC policy vectors. To achieve Optimal Statistical Access Bandwidth, a straightforward
method is to employ brute-force search. However, the method of brute-force search usually has
Computer Science & Information Technology (CS & IT) 371
tremendous computational complexity. Genetic algorithm (GA) to search for the near-optimal
solution. A genetic algorithm is an adaptive heuristic search program that applies the principles of
evolution found in nature. The results show that, our GA algorithm can reach the convergence
after 20 generations, thus can guarantee an efficient implementation.
For seamless handoff it is a challenging task to provide mobile users with QoS guaranteed
service, especially when the traffic load in WMN is heavy. That is, handoff calls have to be given
more preference than new calls in the CAC process, since users are much more sensitive to call
dropping than to call blocking.
In [16], proposed the mobile agent architecture to provide application service in mobile
computing environment. Even though, paper [16] is to compare the performance of client server
architecture and fault tolerance mobile agent system, and cared about security aspects too. A
mobile agent is created and dispatched to the certificate authority [7, 16].
Mobile agent is dispatched to the mobile server if request is accepted. Mobile server gets the
location of the server system corresponds to the user request from server selection database.
Mobile agent is dispatched to the server system for required processing. It is retracted from the
mobile server and replica agent (RA) is created. It also has the functionality for monitoring with
the mobile host when it returns a mobile agent. If the mobile host is currently lost, the replica
agent is set to the inactive status. After the mobile host is connected to mobile server, replica
agent is set to active status and it is migrated from the mobile server to the mobile host. Mobile
server knows that mobile host had already moved to the cell of another mobile server using
IETF’s IP mobility Support [5]. To implement, we selected Aglet as a mobile agent platform
after analyzing different mobile agent platforms such as Aglets, Grasshopper, Voyager etc
[6].
3. PROPOSED WORK
In [1], VANET parallel mobile agent architecture is used to perform the better transmission of
mobile agents, the client initiates multiple MAs, each of which visits a number of nodes in
VANET. The MAs then return to the client and collect their results to complete the task. When
the traffic load in VANET is heavy, many researchers believe that (Call Admission Control) CAC
[2] aims handoff calls have to be given more preference than new calls, since users are much
more sensitive to call dropping than to call blocking [2].
We adopt a proportional threshold based optimal access threshold structure to implement CAC
which, gives Seamless handoff calls and new calls different priorities, and offers high access
bandwidth [9]. We apply mobile agent technology to VANET, each vehicular node is assigned a
“C_MA” (Client’s Mobile Agent), to provide seamless handoff. The mesh client places its C_MA
in the mesh router that it registers with [3]. If the C_MA moves from the range of one vehicular
node to that of another vehicular node too. When a vehicular node wants to handoff, it will
inform its current MH first.
372 Computer Science & Information Technology (CS & IT)
Fig. Special mobile agent.
Then the current MH (Mobile Host) transfers the C_MA to the different MH for information
retrieval for better handoff in neighborhood. To get the complete benefit of mobile agent system,
a suitable information retrieval system for fault tolerance should be taken.
For fault tolerance mechanism, check pointing and replication system is adapted to increase the
reliability of the system. All the C_MA makes a duplicate copy of data at each vehicular node
called IM_node, makes the system fault tolerance, when they migrates until the destination not
found. In this paper we use timestamp ‘Ti’ and threshold ‘Th’ for making the system time
consuming and reliable, that after a timestamp the data will be invalid.
When C_MA reaches its final node then the communication operations between clients and
replicated database servers are implemented using Mobile Agents, takes queries from other
vehicular nodes and returning results to them. During the communication system the system must
be secure. In this paper we use an authentication system for the secure communication. This
authentication system uses a handshaking mechanism, when mobile agent sends request to the
MH (vehicular node) for duplicate copy the server first check for the authentication by knowing
the digital signature of the agent migrates for.
Mechanism:
{
If C_MA==active
//Mobile Agent migrates in the network for //data for handoff
For all IM_nodes
If IM_node! = vehicle
{
MH_data = C_MA_data;
//Make a copy of data at //MH
}
// make a time stamp ‘Ti’
For all C_MA i=1 to n
If (C_MA_lifetime<= Ti && C_MA>=Th)
{
Security ();
Use data for handoff.
}
Else
C_MA++
Computer Science & Information Technology (CS & IT) 373
}
Security(data)
{
For all MA
If (D_sig[MAi]==D_sig)
//Use hash/digital signature function for //authentication
{
Return;
}
}
4. CONCLUSION AND FUTURE SCOPE
In VANET, for better and dynamic data communication, a fault tolerance handoff mechanism
plays an important role in the handover process between the vehicular nodes during the vehicles
are running on the road then mobile agent plays a important role in retrieving the information
during the handoff process. Our research gives a mechanism for fault tolerant mobile agent based
information retrieval system with security improvements. A method for fault tolerance
information retrieval is given in VANET while traffic is moving with random speeds for random
time intervals. Special Mobile agents are considered a suitable technology to develop applications
such as information retrieval system for mobile computing environment.
REFERENCES
[1] Chess, D., Harrison, C., and Kershenbaum, A.: „Mobile agents: are they a good idea?‟. IBM Research
Division, T.J. Watson Research Center, Yorktown Heights, New York, March 1995.
[2] Lange, D.B., and Oshima, M.: „Seven good reasons for mobile agents‟, Commun. ACM, 1999, 42,
pp. 88– 89.
[3] Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network Rakesh Kumar, Dr.
Mayank Dave
[4] Alfonso Fuggetta, Gian Pietro Picco and Giovanni Vigna, "Understanding Code Mobility ", IEEE
Transactions on Software Engineering, vol. 24(5), 1998.
[5] S.S. Manvi, P. Venkataram, “Applications of agent technology in communications: a review”,
Computer Communications 27 (2004), 1493–1508.
[6] G. Weiss, Multiagent systems a modern approach to distributed artificial intelligence, MIT Press,
Boston, 2001.
[7] R. Chadha, G. Lapiotis, S. Wright, “Policy-Based Networking”, IEEE Network special issue,
March/April 2002, Vol. 16 No. 2, guest editors.
[8] R.-H. Hwang and K.-L. Chiu. Communication Framework for Vehicle Ad Hoc Networks on
Freeways. In Preparation.
[9] Seamless Handoff through Information Retrieval in VANET Using Mobile Agent, Himanshu Tyagi,
A. K. Vatsa.
[10] Vertical Handoff Decision Algorithms for Providing Optimized Performance in Heterogeneous
Wireless Networks SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, Yoon Hyuk Kim, and Nada
Golmie
[11] Policy Based Fast Handoff Mechanism for MANET Ankur Gupta, A. K. Vatsa
[12] Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks Elena Pagani and
Gian Paolo Rossi
[13] Neeran M. Karnik and Anand R. Tripathi “Design Issues in Mobile-Agent Programming Systems”,
IEEE Concurrency, July-September, 1998 pp 52-61.
374 Computer Science & Information Technology (CS & IT)
[14] T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy “Quality of service
provisioning in ad hoc wireless networks: a survey of issues and solutions” Ad Hoc Networks VOL.
4, 83–124, (2006).
[15] Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks Bo Rong, Yi
Qian, Kejie Lu, and Michel Kadoch
[16] A Fault Tolerant Mobile Agent Information Retrieval System 1R. Punithavathi and 2K. Duraiswamy
[17] An Introduction to Handoff in Mobile Cellular Communications
“http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/ lecture7/cellular/handoff/handoff.htm1“
[18] Ashutosh Dutta • Subir Das,“Seamless proactive handover across heterogeneous access.
[19] V. Pham, A. Karmouch, “Mobile software agents: An overview”, IEEE Communications Magazine,
36 (1998) 25–37.
[20] D.B. Lange, M. Oshima, “Seven good reasons for mobile agents”, Communications of ACM, 42
(1999) 88–89.
[21] Monica Vladoiu, Zoran Constantinescu, “U-Learning within a context aware multiagent
environment”, International Journal of Computer Networks & Communications (IJCNC), .3 (2011).
[22] Lange, D.B. and M. Oshima, 1998, Programming and Deploying Mobile Agents with Aglets.
Addison- Wesley, USA., ISBN: 020132582.
[23] Lyu, M.R., X. Chem and T.Y. Wong, 2004. Design and evaluation of a fault tolerant mobile agent
system. IEEE Intell. Syst., 19: 32-38. DOI: 10.1109/MIS.2004.40
[24] Ma, Q., W. Hao, W. Li, M. Tu and I.L. Yen, 2003. Pe Agent-a mobile agent system to support secure
internet and web applications. Proceedings of Annual International Computer Software and
Applications Conference, Nov. 3-6, IEEE Computer Society, USA., pp: 690. DOI:
10.1109/CMPSAC.2003.1245418.
[25] Pleisch, S. and A. Schiper, 2003. Fault-tolerant mobile agent execution. IEEE Trans. Comput., 52:
209-222. DOI: 10.1109/TC.2003.117 6987
Bibliography:
Shivani Jain pursuing Master in Technology in Computer Science from Meerut Institute of Engineering
and Technology , Meerut, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in
Information Technology from BIT Meerut. She has coordinated and attended various National Conferences
and Workshops at university level. Her area of interest includes Wireless Network, Computer Network,
Computer Organization, Operating System and Software Engineering
Charu Gupta pursuing Master in Technology in Computer Science from ABES Engineering College,
Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from
ABES Engineering College. She has coordinated and attended various National Conferences and
Workshops at university level. Her area of interest includes Wireless Network, Computer Network,
Computer Organization, Operating System and Software Engineering.
Himanshu Tyagi is working as Assistant Professor in Rajkumar Goel Institute of Technology for women,
He obtained his M-Tech (C.E.) from Shobhit University He has been member of several academic and
administrative bodies. During his teaching he has coordinated several Technical fests and National
Conferences at Institute and University Level. He has attended several seminars, workshops and
conferences at various levels. His several papers are published in various national and international
conferences and journals. His area of research includes MANET (Mobile Ad-Hoc network), Congestion
Control, Network Security and VOIP-SIP(Voice over IP), Cloud Computing.

More Related Content

What's hot

On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic OffloadingIRJET Journal
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdijistjournal
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
 
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...ecij
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennaincct
 

What's hot (16)

On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Kd3118761881
Kd3118761881Kd3118761881
Kd3118761881
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
 
10
1010
10
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 

Similar to SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTS

Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoIAEME Publication
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsUniversity of Piraeus
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksEricsson
 
Networking IEEE 2014 Projects
Networking IEEE 2014 ProjectsNetworking IEEE 2014 Projects
Networking IEEE 2014 ProjectsVijay Karan
 
Networking ieee-2014-projects
Networking ieee-2014-projectsNetworking ieee-2014-projects
Networking ieee-2014-projectsVijay Karan
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...ijseajournal
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...ijseajournal
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...IJECEIAES
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...IRJET Journal
 

Similar to SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTS (20)

A044030110
A044030110A044030110
A044030110
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networks
 
Networking IEEE 2014 Projects
Networking IEEE 2014 ProjectsNetworking IEEE 2014 Projects
Networking IEEE 2014 Projects
 
Networking ieee-2014-projects
Networking ieee-2014-projectsNetworking ieee-2014-projects
Networking ieee-2014-projects
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 

SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTS

  • 1. David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA, NECO - 2013 pp. 369–374, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3538 SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT Shivani Jain1, HimanshuTyagi2 , Charu Gupta3 2 Rajkumar Goel Institute of Technology for Women, Ghaziabad 1 Meerut Institute of Engineering &Technology, Meerut 3 ABES Engineering College, Ghaziabad ABSTRACT Vehicular Traffic poses an emerging issue nowadays. The critical factors for the data communication are speed and time tradeoffs. For data communication, gathering and retrieving information many cost-effective and tested techniques are required in VANET. Client server architectures being coercive are commonly used in spite of having drawbacks of fault and time in-effectiveness. This paper elaborates a proposed method in VANET for fault tolerance information retrieval based on theory of bandwidth and timestamp. Mobile Agents, with the feature of autonomy, social ability, learning, and most importantly mobility, regarded as an appropriate technology to build applications for instance information retrieval system in mobile computing environment. KEYWORDS VANET, Mobile agent, handoff. 1. INTRODUCTION Vehicular Ad-Hoc network is an applied science which consists of moving vehicles as an elementary node for the wireless networks to act as a mobile network. It is one of the wireless ad hoc networks which allow communications between vehicles and close roadside equipments. It is appearing as an uprising technology to combine recent generation wireless networking and vehicles [1].VANET offers: (1) ubiquitous connectivity and (2) efficient vehicle-to-vehicle communications which supports the Intelligent Transportation Systems (ITS) [1-3]. VANET’s are desired to provide high speed and limited degrees of freedom in movement of nodes being distributed, self constructing communication networks. To create high-presentation, extremely measurable and secured technologies of VANET shows an unusual challenge like handoff to the investigate community of wireless [9]. For the handoff mechanism and information retrieval, the software that aims to provide mobility at the programming level is the Mobile Agent.
  • 2. 370 Computer Science & Information Technology (CS & IT) A mobile agent is a program, which epitomize a user in a computer network, and is capable of migrating independently from node to node, to perform some computation on behalf of the user. MA is defined as objects that have behavior, state, and location [4]. Mobile code, and in particular mobile agents, will be an essential tool for allowing such access. Mobile agents are considered as a program, though they have some special properties that differentiate them from the principal programs like mandatory and orthogonal (optional) properties [5-7]. Agents can work without the human interruption or others, reactive or proactive decision making. Agents are an active process which aims to achieve the end objectives. The call should be transferred to the new cell’s base station while a vehicular node travels in a cell (network) during the call else the call will be dropped. This mechanism is termed as handoff. The handover process performed by introducing delays due to discovery, configuration, authentication and binding update procedures associated with a mobility event [17, 18]. Consistent Handoffs (VHO) [10] between heterogeneous nodes in VANET required being fault tolerant to provide smooth roaming, supporting service continuity and Quality of Service (QoS). The network scenario and the basic functionalities required in the system for content request and delivery [3]. The need to support such group operations is bringing together the requirements of (i) a set of transport services that address the group paradigm and provide Quality of Service based broadcast/multicast and the adequate level of fault tolerance, and, (ii), a broadcast/ multicast routing platform to efficiently route packets to the entire population of the network nodes or to a subset [12]. Information retrieval (IR) defines the systems for identifying and presenting documents to relate to mobile environment needs. 2. RELATED WORK The two major issues in implementing the mobile agents in VANET were Agent naming and mobility[3]. An agent should be uniquely defined that their communication should be controlled during the travel in network [13]. Quality of service (QoS) is the assessment of a service provided by the network to the end user. The more deterministic network performance could be achieved with the mobile agents, so that information processed by the network can be better conveyed and network resources can be effectively used. Qualities of Service (QoS) management parameters are important for alleviating multimedia services in a network. A typical QoS architecture should support the following: configuration, prediction, and management of QoS at all the levels of abstraction (user, system and network level); management, control, and processing of a flow must be distinct activities; application must be transparent from establishment and management; asynchronous resource management of different components; and performance enhancement. An agent based QoS architecture do supports all these features [14]. Mobile agents can better address these issues in VANET [1-3]. In this technique, we propose an intelligent agent based network that can be provides [3]. In paper [15], for the MA based handoff in wireless network, it is very important to employ the call admission control (CAC) mechanism in the mesh router. First, call admission control is a critical step for the provision of QoS guaranteed service In this paper, a proportional threshold based optimal access bandwidth policy for CAC on the mesh router is deployed, which adopts threshold structure and gives handoff calls and new calls different priorities. In paper [15], the set of all possible proportional threshold structured CAC policies can be described as a space of all possible CAC policy vectors. To achieve Optimal Statistical Access Bandwidth, a straightforward method is to employ brute-force search. However, the method of brute-force search usually has
  • 3. Computer Science & Information Technology (CS & IT) 371 tremendous computational complexity. Genetic algorithm (GA) to search for the near-optimal solution. A genetic algorithm is an adaptive heuristic search program that applies the principles of evolution found in nature. The results show that, our GA algorithm can reach the convergence after 20 generations, thus can guarantee an efficient implementation. For seamless handoff it is a challenging task to provide mobile users with QoS guaranteed service, especially when the traffic load in WMN is heavy. That is, handoff calls have to be given more preference than new calls in the CAC process, since users are much more sensitive to call dropping than to call blocking. In [16], proposed the mobile agent architecture to provide application service in mobile computing environment. Even though, paper [16] is to compare the performance of client server architecture and fault tolerance mobile agent system, and cared about security aspects too. A mobile agent is created and dispatched to the certificate authority [7, 16]. Mobile agent is dispatched to the mobile server if request is accepted. Mobile server gets the location of the server system corresponds to the user request from server selection database. Mobile agent is dispatched to the server system for required processing. It is retracted from the mobile server and replica agent (RA) is created. It also has the functionality for monitoring with the mobile host when it returns a mobile agent. If the mobile host is currently lost, the replica agent is set to the inactive status. After the mobile host is connected to mobile server, replica agent is set to active status and it is migrated from the mobile server to the mobile host. Mobile server knows that mobile host had already moved to the cell of another mobile server using IETF’s IP mobility Support [5]. To implement, we selected Aglet as a mobile agent platform after analyzing different mobile agent platforms such as Aglets, Grasshopper, Voyager etc [6]. 3. PROPOSED WORK In [1], VANET parallel mobile agent architecture is used to perform the better transmission of mobile agents, the client initiates multiple MAs, each of which visits a number of nodes in VANET. The MAs then return to the client and collect their results to complete the task. When the traffic load in VANET is heavy, many researchers believe that (Call Admission Control) CAC [2] aims handoff calls have to be given more preference than new calls, since users are much more sensitive to call dropping than to call blocking [2]. We adopt a proportional threshold based optimal access threshold structure to implement CAC which, gives Seamless handoff calls and new calls different priorities, and offers high access bandwidth [9]. We apply mobile agent technology to VANET, each vehicular node is assigned a “C_MA” (Client’s Mobile Agent), to provide seamless handoff. The mesh client places its C_MA in the mesh router that it registers with [3]. If the C_MA moves from the range of one vehicular node to that of another vehicular node too. When a vehicular node wants to handoff, it will inform its current MH first.
  • 4. 372 Computer Science & Information Technology (CS & IT) Fig. Special mobile agent. Then the current MH (Mobile Host) transfers the C_MA to the different MH for information retrieval for better handoff in neighborhood. To get the complete benefit of mobile agent system, a suitable information retrieval system for fault tolerance should be taken. For fault tolerance mechanism, check pointing and replication system is adapted to increase the reliability of the system. All the C_MA makes a duplicate copy of data at each vehicular node called IM_node, makes the system fault tolerance, when they migrates until the destination not found. In this paper we use timestamp ‘Ti’ and threshold ‘Th’ for making the system time consuming and reliable, that after a timestamp the data will be invalid. When C_MA reaches its final node then the communication operations between clients and replicated database servers are implemented using Mobile Agents, takes queries from other vehicular nodes and returning results to them. During the communication system the system must be secure. In this paper we use an authentication system for the secure communication. This authentication system uses a handshaking mechanism, when mobile agent sends request to the MH (vehicular node) for duplicate copy the server first check for the authentication by knowing the digital signature of the agent migrates for. Mechanism: { If C_MA==active //Mobile Agent migrates in the network for //data for handoff For all IM_nodes If IM_node! = vehicle { MH_data = C_MA_data; //Make a copy of data at //MH } // make a time stamp ‘Ti’ For all C_MA i=1 to n If (C_MA_lifetime<= Ti && C_MA>=Th) { Security (); Use data for handoff. } Else C_MA++
  • 5. Computer Science & Information Technology (CS & IT) 373 } Security(data) { For all MA If (D_sig[MAi]==D_sig) //Use hash/digital signature function for //authentication { Return; } } 4. CONCLUSION AND FUTURE SCOPE In VANET, for better and dynamic data communication, a fault tolerance handoff mechanism plays an important role in the handover process between the vehicular nodes during the vehicles are running on the road then mobile agent plays a important role in retrieving the information during the handoff process. Our research gives a mechanism for fault tolerant mobile agent based information retrieval system with security improvements. A method for fault tolerance information retrieval is given in VANET while traffic is moving with random speeds for random time intervals. Special Mobile agents are considered a suitable technology to develop applications such as information retrieval system for mobile computing environment. REFERENCES [1] Chess, D., Harrison, C., and Kershenbaum, A.: „Mobile agents: are they a good idea?‟. IBM Research Division, T.J. Watson Research Center, Yorktown Heights, New York, March 1995. [2] Lange, D.B., and Oshima, M.: „Seven good reasons for mobile agents‟, Commun. ACM, 1999, 42, pp. 88– 89. [3] Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network Rakesh Kumar, Dr. Mayank Dave [4] Alfonso Fuggetta, Gian Pietro Picco and Giovanni Vigna, "Understanding Code Mobility ", IEEE Transactions on Software Engineering, vol. 24(5), 1998. [5] S.S. Manvi, P. Venkataram, “Applications of agent technology in communications: a review”, Computer Communications 27 (2004), 1493–1508. [6] G. Weiss, Multiagent systems a modern approach to distributed artificial intelligence, MIT Press, Boston, 2001. [7] R. Chadha, G. Lapiotis, S. Wright, “Policy-Based Networking”, IEEE Network special issue, March/April 2002, Vol. 16 No. 2, guest editors. [8] R.-H. Hwang and K.-L. Chiu. Communication Framework for Vehicle Ad Hoc Networks on Freeways. In Preparation. [9] Seamless Handoff through Information Retrieval in VANET Using Mobile Agent, Himanshu Tyagi, A. K. Vatsa. [10] Vertical Handoff Decision Algorithms for Providing Optimized Performance in Heterogeneous Wireless Networks SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, Yoon Hyuk Kim, and Nada Golmie [11] Policy Based Fast Handoff Mechanism for MANET Ankur Gupta, A. K. Vatsa [12] Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks Elena Pagani and Gian Paolo Rossi [13] Neeran M. Karnik and Anand R. Tripathi “Design Issues in Mobile-Agent Programming Systems”, IEEE Concurrency, July-September, 1998 pp 52-61.
  • 6. 374 Computer Science & Information Technology (CS & IT) [14] T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy “Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions” Ad Hoc Networks VOL. 4, 83–124, (2006). [15] Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks Bo Rong, Yi Qian, Kejie Lu, and Michel Kadoch [16] A Fault Tolerant Mobile Agent Information Retrieval System 1R. Punithavathi and 2K. Duraiswamy [17] An Introduction to Handoff in Mobile Cellular Communications “http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/ lecture7/cellular/handoff/handoff.htm1“ [18] Ashutosh Dutta • Subir Das,“Seamless proactive handover across heterogeneous access. [19] V. Pham, A. Karmouch, “Mobile software agents: An overview”, IEEE Communications Magazine, 36 (1998) 25–37. [20] D.B. Lange, M. Oshima, “Seven good reasons for mobile agents”, Communications of ACM, 42 (1999) 88–89. [21] Monica Vladoiu, Zoran Constantinescu, “U-Learning within a context aware multiagent environment”, International Journal of Computer Networks & Communications (IJCNC), .3 (2011). [22] Lange, D.B. and M. Oshima, 1998, Programming and Deploying Mobile Agents with Aglets. Addison- Wesley, USA., ISBN: 020132582. [23] Lyu, M.R., X. Chem and T.Y. Wong, 2004. Design and evaluation of a fault tolerant mobile agent system. IEEE Intell. Syst., 19: 32-38. DOI: 10.1109/MIS.2004.40 [24] Ma, Q., W. Hao, W. Li, M. Tu and I.L. Yen, 2003. Pe Agent-a mobile agent system to support secure internet and web applications. Proceedings of Annual International Computer Software and Applications Conference, Nov. 3-6, IEEE Computer Society, USA., pp: 690. DOI: 10.1109/CMPSAC.2003.1245418. [25] Pleisch, S. and A. Schiper, 2003. Fault-tolerant mobile agent execution. IEEE Trans. Comput., 52: 209-222. DOI: 10.1109/TC.2003.117 6987 Bibliography: Shivani Jain pursuing Master in Technology in Computer Science from Meerut Institute of Engineering and Technology , Meerut, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from BIT Meerut. She has coordinated and attended various National Conferences and Workshops at university level. Her area of interest includes Wireless Network, Computer Network, Computer Organization, Operating System and Software Engineering Charu Gupta pursuing Master in Technology in Computer Science from ABES Engineering College, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from ABES Engineering College. She has coordinated and attended various National Conferences and Workshops at university level. Her area of interest includes Wireless Network, Computer Network, Computer Organization, Operating System and Software Engineering. Himanshu Tyagi is working as Assistant Professor in Rajkumar Goel Institute of Technology for women, He obtained his M-Tech (C.E.) from Shobhit University He has been member of several academic and administrative bodies. During his teaching he has coordinated several Technical fests and National Conferences at Institute and University Level. He has attended several seminars, workshops and conferences at various levels. His several papers are published in various national and international conferences and journals. His area of research includes MANET (Mobile Ad-Hoc network), Congestion Control, Network Security and VOIP-SIP(Voice over IP), Cloud Computing.