Interference with Overhearing for Secure Ad-Hoc Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fuzzy Realistic Mobility Model for Ad hoc Networks

Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...

متن کامل

Secure Routing for Mobile Ad Hoc Networks

For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of security cannot be underrated. The provision of comprehensive secure communication mandates that both route discovery and data forwarding be safeguarded. The discussed here Secure Routing Protocol (SRP) [1] counters malicious be...

متن کامل

Secure Service Provision in Ad Hoc Networks

Ad hoc networks are formed opportunistically as mobile devices come within wireless communication range of each other. Since individual devices are typically subject to severe resource limitations, it is both possible and desirable for a device to enhance its functionality by taking advantage (in a cooperative manner) of capabilities available on other devices. Service provision refers to the p...

متن کامل

Secure Resource Sharing in Ad hoc Networks

Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today’s PC power is unused, as a study of the Gartner Group indicates. Grid computing and P2P systems take advantage of this fact and provide unused resources to other nodes within the network, but mobile scenarios or ad hoc networks are often left out. This paper presents a co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Computer Science and Engineering

سال: 2017

ISSN: 2475-8841

DOI: 10.12783/dtcse/cnsce2017/8888