نتایج جستجو برای: keywords network security

تعداد نتایج: 2667445  

2013
Ping He

This paper discusses in detail the theory of nonoptimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimu...

2010
C. Sreedhar

An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network...

2013
V. Senthil

WirelessNetwork Environment poses its unique challenges to the existing Transaction models which are fail to solve. Wireless ad hoc networks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, we present SANA, a Secure Ad hoc Network Arch...

Journal: :CoRR 2017
Furrakh Shahzad Maruf Pasha Arslan Ahmad

Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an ab...

2017
S. Usharani

Eliminate the eavesdropper collusion occurredby the two or more devices communicating via optimal relay with centralized router using IOT network. The overall delay is reduced with increase in throughput.This paper studies the important of Received signal strength of wireless communication under eavesdropper collusion where detecting the malicious node. To provide knowledge about the security i...

2015
Akanksha Bali Shailendra Narayan Singh

Network security is vital for securing all information that passed through network computer; hence network security is the most important element in information security. Security is one of the critical concern occurred in WSN due to limitations in computing and fixed resource. Wireless sensor network have a broad area of invaluable games, defence, civil, household, entertainment application. W...

B. Farnoushfar, , B. Minaei, , M. Nasiri, , N. Najafli, ,

Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...

2012
S. M. Sarwarul Islam Rizvi Zinat Sultana Bo Sun Washiqul Islam

In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from net...

2012
Vishal Garg

Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Quality is dependent on size and some other factors of network but security is very concern parameter in network as it is independent of network size and comp...

Journal: :CoRR 2014
Lynda Sellami Djilali Idoughi Abderrahmane Baadache

Ubiquitous computing allows to make data and services within the reach of users anytime and anywhere. This makes ubiquitous networks vulnerable to attacks coming from either inside or outside the network. To ensure and enhance networks security, several solutions have been implemented. These solutions are inefficient and/or incomplete. Solving these challenges in security with new requirement o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید