Literature Review Resource Management in Suburban Ad-Hoc Networks with Decentralized Capabilities

نویسنده

  • Stanley Gunawan
چکیده

3 Availability techniques 3 3.1 Detection approaches . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.1 Distributed and Cooperative Intrusion Detection . . . 3 3.1.2 Watchdog and Pathrater . . . . . . . . . . . . . . . . . 4 3.1.3 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) . . . . . . . . . . . . . . . . 5 3.1.4 CORE (Collaborative Reputation) . . . . . . . . . . . 6 3.2 Incentive based approaches . . . . . . . . . . . . . . . . . . . 6 3.2.1 Terminodes . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2.2 Sprite . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.3 Secure Charging Protocol in Ad Hoc Stub Networks . 10 3.2.4 Priority Forwarding . . . . . . . . . . . . . . . . . . . 10

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks

In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

طراحی لایه- متقاطع برای کنترل ازدحام، مسیریابی و زمان‌بندی در شبکه‌های بی‌سیم ad-hocبا در نظر‌گرفتن توان الکتریکی گره‌ها

Abstract Ad hoc Wireless Networks, are networks formed by a collection of nodes through radio. In wireless networking environment, formidable challenges are presented. One important challenge is connection maintenance mechanism for power consumption. In this paper, a multi-objective optimal design is considered for ad-hoc networks which address the electrical power of nodes effects on cross-l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003