Survey on Secure Data Retrieval Techniques for Military Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant networks (DTN) technologies are emerging to become most successful solutions which allows the wireless devices to be carried by the soldier in-order to make communication with each other and access the informatio...

متن کامل

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Disruption-tolerant network (DTN) advancements are getting to be a productive provision that allow remote device passed on by officers to talk with each other and access the classified data or secret data by abusing outside storage nodes. This framework gives the effective situation to approval strategies and the solutions overhaul for secure data recovery in most difficult cases. The most enco...

متن کامل

A Survey on Fault Tolerant Data Retrieval in Military Network

In military environments, like battlefield or a hostile region, the mobile nodes might suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technology is the successful solution that allow, wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external stor...

متن کامل

Survey on Data Aggregation Techniques for Wireless Sensor Networks

Wireless sensor networks (WSNs) consist of sensor nodes. These networks have huge application in habitat monitoring, disaster management, security and military, etc. Wireless sensor nodes are very small in size and have limited processing capability and very low battery power. This restriction of low battery power makes the sensor network prone to failure. Data aggregation is a very crucial tec...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016908574