نتایج جستجو برای: hoc networks
تعداد نتایج: 460314 فیلتر نتایج به سال:
Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the divers...
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is no...
There is still no consistent definition of general ad hoc network properties. All introduced protocols for ad hoc networks are based on different assumptions and security requirements, and are consequently suited for specific applications only. Due to the broad field of applications, a general security model can still not be found in any literature. We define two ad hoc network categories, name...
Advances in wireless personal area networking p. 3 A comparative study of routing strategies for wireless sensor networks : are MANET protocols good fit? p. 5 Detecting disruptive routers in wireless sensor networks p. 19 Energy-efficient data dissemination in sensor networks using distributed dynamic tree management p. 32 Virtual coordinates with backtracking for void traversal in geographic r...
Security of mobile ad hoc networks is more challenging task due to its complex properties. In mobile ad hoc networks, intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the security point of view, many intrusion detection systems have been proposed to mobile ad ...
VANETs solutions use aggregated graph representation to model the interaction among vehicles and different complex network measures quantify some topological characteristics. This modeling ignores temporal interactions between cars, causing loss of information or unrealistic behavior. work proposes both graphs applications. To verify viability this model, we initially perform a comparative anal...
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...
Dynamic Bandwidth Management for Wireless Ad hoc Networks for Two Zones under Homogeneous Conditions
Wireless communication networks, in particular ad hoc networks have revolutionized the field of Networking with increasing number of commercial and military applications. Establishing communication through portable devices without the dependence on or constraints of any central infrastructural id possible through ad hoc networks. Wireless ad hoc networks models play a predominant role in perfor...
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad hoc networks. Ad hoc networks have lots of applications; however, a vita...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید