Interference with Overhearing for Secure Ad-Hoc Networks
نویسندگان
چکیده
منابع مشابه
A Fuzzy Realistic Mobility Model for Ad hoc Networks
Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...
متن کاملSecure Routing for Mobile Ad Hoc Networks
For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of security cannot be underrated. The provision of comprehensive secure communication mandates that both route discovery and data forwarding be safeguarded. The discussed here Secure Routing Protocol (SRP) [1] counters malicious be...
متن کاملSecure Service Provision in Ad Hoc Networks
Ad hoc networks are formed opportunistically as mobile devices come within wireless communication range of each other. Since individual devices are typically subject to severe resource limitations, it is both possible and desirable for a device to enhance its functionality by taking advantage (in a cooperative manner) of capabilities available on other devices. Service provision refers to the p...
متن کاملSecure Resource Sharing in Ad hoc Networks
Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today’s PC power is unused, as a study of the Gartner Group indicates. Grid computing and P2P systems take advantage of this fact and provide unused resources to other nodes within the network, but mobile scenarios or ad hoc networks are often left out. This paper presents a co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Computer Science and Engineering
سال: 2017
ISSN: 2475-8841
DOI: 10.12783/dtcse/cnsce2017/8888