Dynamic Network Control for Confidential Multi-Hop Communications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Multi-hop Video Communications

In this paper, we present an intelligent multi-hop communications architecture for quality video delivery over networks. The key to this architecture is the insertion of relays with different levels of intelligence along the end-to-end path that coordinate with each other and the end-systems. The main objective is to achieve a synergy among these strategically deployed relays and end-systems to...

متن کامل

Efficient multi-hop communications in Bluetooth scatternets

This study proposes an integrated ad hoc routing and time-slot scheduling (IARTSS) scheme to address the problem of ad hoc routing in Bluetooth networks. Our proposed scheme contains four main mechanisms to address the different facets of the problem, namely CompensationBased Time-Slot Assignment (CTSA), Traffic Differentiation Queueing (TDQ), Adaptive Master-Slave Switching (AMSS), and an Enha...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

Dynamic Access Control for Multi-privileged Group Communications

Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access control schemes for group applications assume that all the group members have the same access privilege and mostly focus on how to reduce rekeying messages upon user joining and leaving. Relatively little research effort has be...

متن کامل

An Application of Group Theory in Confidential Network Communications

A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE/ACM Transactions on Networking

سال: 2016

ISSN: 1063-6692,1558-2566

DOI: 10.1109/tnet.2015.2414945