Design Methodology for Self-organized Mobile Networks Based

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Organized Public-Key Management for Mobile Ad Hoc Networks

In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad ho...

متن کامل

Self-organized coverage and capacity optimization for cellular mobile networks

The challenging task of cellular network planning and optimization will become more and more complex because of the expected heterogeneity and enormous number of cells required to meet the traffic demands of coming years. Moreover, the spatio-temporal variations in the traffic patterns of cellular networks require their coverage and capacity to be adapted dynamically. The current network planni...

متن کامل

Self-Organized Disjoint Service Placement in Future Mobile Communication Networks

Future mobile communication networks will offer many ubiquitous services to its clients such as voice and video communication, access to data and files, use of virtual resources in cloud, etc. The provision of these services in face of the different challenges posed by future wireless networks such as changing network topology, variable load conditions, clients’ distribution, QoS requirements e...

متن کامل

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy em...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Interactive Multimedia and Artificial Intelligence

سال: 2016

ISSN: 1989-1660

DOI: 10.9781/ijimai.2016.377