Improved Bootstrapping Scheme with Cache Consistency for Resistance on MANET
نویسنده
چکیده
undermine the correctness, and
منابع مشابه
An Efficient Cache Consistency Scheme in Mobile Networks
In this paper we proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the queries that are submitted by requesting nodes in special nodes, called query directories (QDs), and uses these queries to locate the data (responses) that are stored in the nodes that requested them, called caching...
متن کاملEnhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fixed node, each node acts as a router, providing routing capability for the MANET. Various protocols for discovery of routes between any two MANET nodes have been designed. These protocols are...
متن کاملCaching Techniques for Parallel I/O Servicing
Parallel and distributed systems archi tectures support parallel I O components Caching has been applied to distributed I O subsystems as a standard solution to the problems of fastening data accessibility and increasing data reliability Cache consistency mechanisms have been implemented in order to in uence the cache usefulness in a posi tive way This paper presents a new caching tech nique ba...
متن کاملClient Based Cache Consistency Scheme in Wireless Mobile Networks
This paper proposes a client based cache consistency scheme for maintaining cache consistency in wireless mobile networks using a distributed cache invalidation method. This is implemented on top of a previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COCAS. We have also previously proposed a client and server based consistency scheme, named SSUM ...
متن کاملBootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of ...
متن کامل