• Nenhum resultado encontrado

Mobile ad hoc Networks, MANET

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

... wireless networks are rapidly deployed in the future, secure wireless environment will be ...wireless networks,Mobile Ad hoc Networks (MANET) is one of the most important ...

12

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... of mobile nodes such as Laptop, PDAs and wireless phones with the characteristics of self-organization and self-configuration ...[6]. Mobile ad hoc networks (MANET) are also ...

4

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... A Mobile Ad Hoc Networks (MANET) is a collection of mobile nodes that can communicate with each other using multi-hop wireless links without utilizing any fixed based- station ...

7

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

... The mobile nodes in MANET are located randomly and continuously changing their positions in ...among mobile nodes are also changing frequently. Such networks are thus self-organizing and self- ...

6

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access ...The MANET protocols can be ...

5

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

... Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the last ...by Mobile Ad-Hoc Networks ...of networks ...

19

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

... wired networks where most packet loss occurs due to network ...wired networks, WLANs, or Mobile Ad hoc Networks ...of MANET factors on TCP congestion ...of MANET ...

8

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... Wireless ad hoc networks, also called Mobile Ad Hoc Networks (MANETs) are collections of autonomous mobile nodes or terminals that communicate with each other by ...

6

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

... MANET needs more security because of the nature of mobile nodes. This study gives security to the Variable Bit rate on demand Routing protocol (VBOR). When compared symmetric key cryptography, public key ...

9

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... of mobile nodes. In this scheme each mobile node has a floating, virtual ID (VID), and the amount of VID is match as its ID number at ...Initially, mobile nodes with the superior IDs in their local ...

14

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... In MANET, a DoS attack can be easily setup by flooding numerous request packets or data packets; a attacker may send request packets in a short time to the destination node which does not exist in the network; as ...

20

Performance evaluation of DSR Protocol under DoS attack

Performance evaluation of DSR Protocol under DoS attack

... A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network ...the mobile ad hoc ...

4

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... Umaparvathi and Varughese in [9] presented a comparison of the most commonly used symmetric encryption algorithms AES (Rijndael), DES, 3DES and Blowfish in terms of power consumption. A comparison had been conducted for ...

13

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

... traditional networks: (a) it can be easily set up and dismantled; (b) it is a cost-effective solution for providing communication in areas where setting up fixed infrastructures is not a suitable option ...

17

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... The nodes in the Ad hoc networks are independent and well structured. We know that a couple of nodes can interact with one another, if they have entered into the opponent transition region. For this ...

6

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

... route failures in MANET. Proposed algorithm ensures that the multiple paths are loop-free and is node disjoint. Comparative study of CLDM-AODV, classical AODV and NDMR is performed using ns-2 simulations under ...

14

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... computing. The distributed query processing systems assume an ‘always-on’ situation in network, which can seriously be affected and modified by the intermittent connectivity. A fault in the present systems is the absence ...

6

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

... in Mobile Ad-hoc Net- works (MANET) can be very ...The ad-hoc net- works has scarce bandwidth and a constant change of ...

7

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... wired networks get their electrical supply directly through available power grids, in MANET nodes are generally operated by small batteries with a limited ...these networks is not levelled. The lack ...

12

Implementing Smart Antenna System in Mobile Ad Hoc  Networks

Implementing Smart Antenna System in Mobile Ad Hoc Networks

... fast networks whether they are at work, at home, or on the ...an ad hoc fashion on the ...as Mobile Ad hoc NETwork ...in MANET using ...

6

Show all 4889 documents...

temas relacionados