نتایج جستجو برای: ad hoc networks

تعداد نتایج: 510069  

2011
Ramesh Kumar

Development of handheld features and mobile telephony makes Ad hoc networks widely adopted, but security remains a complicated issue. Recently, there are several proposed solutions treating authentication, availability, secure routing and intrusion detection etc, in Ad hoc networks. In this paper we introduce a securing data protocol in Ad hoc networks, SDMP protocol. This solution increases th...

2013
Huang Wen

Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks,The resear...

2004
Christie Shuster

Ad hoc networks are becoming more and more popular as the use of mobile computing devices increases. While ad hoc networks have many advantageous properties, they also pose several security challenges which are unique to networks of this kind. One of the main challenges that ad hoc networks have to face is authentication. Authentication is difficult to achieve in ad hoc networks because some ty...

2009
BO SUN

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...

2015
John Felix Charles Joseph Amitabha Das

IntroductIon Wireless ad hoc networks have attracted extensive attention among researchers in recent years. As the research activities matured, it has been widely realized that security in such networks is a major issue, and an extremely challenging one. The challenge arises mainly from the inherent AbstrAct Intrusion detection in ad hoc networks is a challenge because of the inherent character...

Journal: :Computer Communications 2003
Kaustubh S. Phanse Luiz A. DaSilva

Quality of Service (QoS) provisioning and management in ad hoc networks remains a challenging task. Existing research focuses either on providing QoS or on network management, in ad hoc networks. However, a comprehensive approach to QoS management in ad hoc networks, i.e. network management in support of service differentiation, QoS robustness, and network survivability is still lacking. In thi...

2002
Chi-Hsiang Yeh H. T. Mouftah Hossam S. Hassanein

In this paper, we propose an architecture for provisioning nondisrupted QoS guarantees in mobile ad hoc networks, and extend the scalable resource reservation protocol (SRRP) for signaling in ad hoc networks. In particular, we present a number of techniques that can enable QoS guarantees in ad hoc networks, including geographical reservation and clusterhead election (GRACE), the request-to-rese...

The systems in which information and communication technologies and systems engineering concepts are utilized to develop and improve transportation systems of all kinds are called “The Intelligent Transportation Systems (ITS)”. ITS integrates information, communications, computers and other technologies and uses them in the field of transportation to build an integrated system of people, roads ...

2015

Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous ...

2004
Alexander Artikis Lloyd Daniel Kamara Jeremy V. Pitt Marek J. Sergot

Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what extent ad hoc networks can usefully be described in terms of permissions, obligations and other more complex normative relations, based on our previous work on specifying and modelling open agent societies. We now propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید