scispace - formally typeset
K

K. H. Wandra

Researcher at Gujarat Technological University

Publications -  13
Citations -  126

K. H. Wandra is an academic researcher from Gujarat Technological University. The author has contributed to research in topics: Routing protocol & Distance-vector routing protocol. The author has an hindex of 4, co-authored 13 publications receiving 108 citations. Previous affiliations of K. H. Wandra include Saurashtra University & Parul Institute of Engineering and Technology.

Papers
More filters
Journal ArticleDOI

Survey on Mobile Ad Hoc Network Routing Protocols

TL;DR: This review paper provides an overview of existing mobile ad-hoc proactive and reactive routing protocols depending on their reactive and reactive nature respectively by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance.
Proceedings ArticleDOI

Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET

TL;DR: A secured Ad hoc on demand distance vector (AODV) approach which efficiently finds wormhole attack present in a MANET and Digital signature is used to prevent it and digital signature and hash chain algorithm is applied to mitigate the wormhole node.
Journal ArticleDOI

Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation

TL;DR: The threat model STRIDE and the ill-use of the cloud services for many mischievous purpose by the oppugners around the world are discussed and a few issues of forensics in cloud computing environment are touched on.
Proceedings ArticleDOI

4G Wireless Networks: Opportunities and Challenges

TL;DR: Some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions are described.
Journal ArticleDOI

Centralized Timestamp based Approach for Wireless Sensor Networks

TL;DR: This work has designed an efficient timestamp-based protocol called “SET-CTA” to provide defense against variety of security attacks in non-clustered wireless sensor deployment environments and is the only end-to-end timestamp based scheme that can provide secure and efficient transmission in centralized wireless sensor environments and can also assure protection against different range ofSecurity attacks.