نتایج جستجو برای: mobile ad

تعداد نتایج: 246628  

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

2007
Shushan Zhao

This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. To introduce the topic, we first review most important developments on general Identity-Based Cryptography. The survey introdu...

Journal: :Ad Hoc & Sensor Wireless Networks 2007
Xu Li Amiya Nayak Isabelle Simplot-Ryl David Simplot-Ryl

Many plain routing protocols have been proposed for mobile ad hoc networks. These protocols all assume cooperative networks and focus only on routing effectiveness and efficiency. However, mobile ad hoc networks are not a friendly environment for various reasons in nature. Routing Protocols without any security feature can put entire network at risk. As security becomes an increasingly importan...

2010
R. K. Chauhan Ashish Chopra

A mobile ad hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Mobile ad-hoc networks are the autonomous systems of mobile nodes forming network in the absence of any centralized support. Although establishing correct and efficient routes is an important d...

2009
BO SUN

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...

2005
Ping Yi Zhoulin Dai Shiyong Zhang Yiping Zhong

Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...

2013
Manpreet Kaur Jyoti Kohli

A mobile ad-hoc network is an autonomous network that can be formed without any established infrastructure, where nodes can move arbitrary in the topology with variation of speed and trajectory. Mobile Ad-hoc Networks prove to be the best fit for various applications like Military operations, Flood affected areas, Remote area etc. Ad-hoc Networks are limited with energy and generally more vener...

2015
Parul Yadav Manish Gaur Thomas Plagemann Vera Goebel Carsten Griwodz Changling Liu Hao Yang Haiyun Luo Fan Ye Songwu Lu

Mobile ad hoc network is an autonomous collection of mobile or stationary nodes communicating with each other via radio transceivers that has limited radio transmission range. In ad hoc networking, nodes are connected without any fixed infrastructure. Applications for mobile ad hoc network range from personal networks to emergency services. Major challenges to these innovative networks are due ...

2006
Leonardo A. Martucci Christer Andersson Simone Fischer-Hübner

This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first lowlatency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Cha...

2015
Christer Andersson Leonardo A. Martucci Simone Fischer-Hübner

Providing privacy is often considered a keystone factor for the ultimate take up and success of mobile ad hoc networking. Privacy can best be protected by enabling anonymous communication and, therefore, this chapter surveys existing anonymous communication mechanisms for mobile ad hoc networks. On the basis of the survey, we conclude that many open research challenges remain regarding anonymit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید