• Nenhum resultado encontrado

[PDF] Top 20 Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

Has 10000 "Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks" found on our website. Below are the top 20 most common "Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks".

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

... Securing mobile ad hoc networks (MANETs) is a crucial task for their good ...is key management. While Public Key Infrastructure (PKI) based solutions has provided these properties ... See full document

9

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

... problem in MANET and it lacks security and reliability of data. A Key management is vital part of ...security. Key management protocols then play a key role in any secure ... See full document

12

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

... drawback in the existing protocols in dealing with energy management issues is that the time varying nature of the wireless channels among the ad hoc nodes is ...energy efficient Medium Access ... See full document

7

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

... a group mobile nodes with similar mobility pattern into a cluster, (Dang and Wu, 2010) proposed a cluster-based routing protocol for Delay- Tolerant Mobile Networks ...an efficient and ... See full document

7

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

... A mobile ad hoc network (MANETs) is a self-organizing network that consists of mobile nodes that are connected through wireless ...and efficient routing operations in MANET a challenging ...of ... See full document

9

Simulation of A Novel Scalable Group Key Management Protocol for Mobile Adhoc Networks

Simulation of A Novel Scalable Group Key Management Protocol for Mobile Adhoc Networks

... scalability in Group communication, we proposed A Novel Scalable Group Key Management Protocol for MANETs and demonstrated that it has better scalability in terms of number of ... See full document

7

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

... The Gray Hole attack has two phases. Initially, a malicious node exploits the AODV protocol to advertise itself as having a valid route to a destination node, with the intention of intercepting packets, even though the ... See full document

15

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... relays in which each forward node determine the status of it neighbors based on its partial 2-hop information through node ...broadcasting in ad hoc wireless ...problems in broadcast ... See full document

6

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

... network in a manner that emulates the properties of a private ...Address Management, Data Compression, Data Encryption and Key ...established in VPN using Point-to-Point Tunneling Protocol ... See full document

4

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

... once in the sensor in a round robin fashion and saves its ...place in routing plan and route re- computation ...ID. In the node addition process new node broadcasts a HELLO message ... See full document

7

Generating Secure Group Key Using m-ARY Based Key Tree Structure in Sensor Networks

Generating Secure Group Key Using m-ARY Based Key Tree Structure in Sensor Networks

... tree-based key management technique for SGC in sensor ...The scheme uses m-ary tree and at each level m keys are ...new group key is selected and distributed to other ...new ... See full document

4

A RSS Based Adaptive Hand-Off Management Scheme In Heterogeneous Networks

A RSS Based Adaptive Hand-Off Management Scheme In Heterogeneous Networks

... these networks. A MT can be in the coverage area of a cellular network BS at one instant and be connected to the corresponding BS, but due to its mobility it can move over to the coverage area of a WLAN or ... See full document

7

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

... the mobile elements are designed to visit each node. In this approach the data of each node is gathered by a mobile element via single-hop ...communication. In this situation, the path ... See full document

16

Mobile platform-independent solutions for body sensor network interface

Mobile platform-independent solutions for body sensor network interface

... data, in bytes, to the inherent correct graphical ...the mobile device ...value, in Celsius degrees, should be performs with another ...organized in bytes, and then a transformation is ... See full document

120

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

... statement: In this study, we proposed a method to improve the performance of AODV by reducing overhead by adopting a route message propagation ...new scheme, a node will be selected to forward a routing ... See full document

5

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

... for efficient load balancing ...balancing in order to achieve the improved QoS ...together in order to achieve both energy efficiency and improved QoS ...However, in this paper, we keep the ... See full document

6

An Optimization Scheme for Energy Efficient Ad-hoc Wireless Networks Operating in Error-prone Channel Conditions

An Optimization Scheme for Energy Efficient Ad-hoc Wireless Networks Operating in Error-prone Channel Conditions

... control scheme is presented to improve the performance and energy efficiency of IEEE ...wireless networks operating in ad-hoc ...nodes in physical carrier sense systems has a major influence ... See full document

5

An experimental study of an efficient supercapacitor stacking scheme to power mobile phones

An experimental study of an efficient supercapacitor stacking scheme to power mobile phones

... As mobile phones are designed to operate from a fixed DC voltage source, the main technical difficulty lies in matching the non-fixed supercapacitor cell voltage to the required ...power mobile ... See full document

5

Efficient access of mobile flows to heterogeneous networks under flash crowds

Efficient access of mobile flows to heterogeneous networks under flash crowds

... strategies in a heterogeneous network infrastructure on both financial and performance aspects, using a brokerage ...technologies in the presence of flash crowd ...fairness in the market, rewarding ... See full document

21

Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks

Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks

... trust management model has been ...obtained. In this protocol, a source establishes optimal trustworthy paths in a single route ...path in all path candidates with trust ...improvement ... See full document

10

Show all 10000 documents...