نتایج جستجو برای: hoc networks

تعداد نتایج: 460314  

2005
Katrin Hoeper Guang Gong

Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the divers...

2012
H. Umadevi K. S. Gurumurthy Chandrakanth Gowda

Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is no...

2004
Katrin Hoeper Guang Gong

There is still no consistent definition of general ad hoc network properties. All introduced protocols for ad hoc networks are based on different assumptions and security requirements, and are consequently suited for specific applications only. Due to the broad field of applications, a general security model can still not be found in any literature. We define two ad hoc network categories, name...

2006
Mani B. Srivastava

Advances in wireless personal area networking p. 3 A comparative study of routing strategies for wireless sensor networks : are MANET protocols good fit? p. 5 Detecting disruptive routers in wireless sensor networks p. 19 Energy-efficient data dissemination in sensor networks using distributed dynamic tree management p. 32 Virtual coordinates with backtracking for void traversal in geographic r...

2014
Priyanka Dahiya Alka Chaudhary

Security of mobile ad hoc networks is more challenging task due to its complex properties. In mobile ad hoc networks, intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the security point of view, many intrusion detection systems have been proposed to mobile ad ...

Journal: :Journal of Network and Computer Applications 2021

VANETs solutions use aggregated graph representation to model the interaction among vehicles and different complex network measures quantify some topological characteristics. This modeling ignores temporal interactions between cars, causing loss of information or unrealistic behavior. work proposes both graphs applications. To verify viability this model, we initially perform a comparative anal...

2009
BO SUN

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...

2017
Rajesh Yadav T. Srinivasa Rao P. Suresh Varma Samarth H Shah Kai Chen Klara Nahrstedt Ying Qiu Iftekhar Hussain Zaved Iqubal Ahmed Dilip kumar Saikia Mostafa Hashem Sherif

Wireless communication networks, in particular ad hoc networks have revolutionized the field of Networking with increasing number of commercial and military applications. Establishing communication through portable devices without the dependence on or constraints of any central infrastructural id possible through ad hoc networks. Wireless ad hoc networks models play a predominant role in perfor...

2011
Avinash Jethi

Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad hoc networks. Ad hoc networks have lots of applications; however, a vita...

Journal: :International Journal of Wireless & Mobile Networks 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید