• Nenhum resultado encontrado

[PDF] Top 20 Data Confidentiality in Mobile Ad hoc Networks

Has 10000 "Data Confidentiality in Mobile Ad hoc Networks" found on our website. Below are the top 20 most common "Data Confidentiality in Mobile Ad hoc Networks".

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a ... See full document

12

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... A mobile ad hoc network (MANET) is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now ...the networks that are ... See full document

4

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... nodes in the total ...test data packet to verify if this link is unusual, such as the packet being ...attackers. In this way, the attackers would be isolated, and then ...counts in ... See full document

20

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

... protocol in the TCP/IP Protocol ...wired networks where most packet loss occurs due to network congestion. In theory, TCP should not care whether it is running over wired networks, WLANs, or ... See full document

8

Mobile ad hoc networks tcp performance and comparison over routing protocols

Mobile ad hoc networks tcp performance and comparison over routing protocols

... prevalent in satellite networks ...failures in an ad hoc ...feedback in the form of route failure and reestablishment control ...network, in which the link betien ... See full document

9

Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions

Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions

... Wireless ad-hoc networks (WANETs) have gained increasing popularity because of the ubiquitous communication needs with satisfying ...costs. Data communication is irrevocable for many people ... See full document

7

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... transferring data from widely distributed sources so that data can be collected, interpreted, and correlated locally, regionally, and “globally”, as appropriate, and exchanged among pairs or groups of peer ... See full document

7

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... implementation in the NS-2 ...protocols, data sources and network elements. In NS-2, the system is modeled as sequential events that take an arbitrary amount of ...handle data processing and ... See full document

13

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... collision in blind ...introduced in the study utilizes a dynamic probabilistic broadcast coupled with the neighbor ...kept in the neighbor ...neighbors in the network is proportion to the size ... See full document

6

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... interested in content, and must thus receive ...a data dissemination scheme in which a data center selects specific roads on which to push the content, based on a dissemi- nating ...the ... See full document

143

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... hungry in the case of communication and computation. The accuracy in aggregation of vehicles depends upon the density of vehicles, the higher the density the greater the accurate ...Reduction in the ... See full document

7

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

... A mobile ad-hoc network (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless ...links. In MANET, there is a possibility ... See full document

7

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

... Multi-hop data delivery through vehicular ad hoc networks is complicated by the fact that vehicular networks are highly mobile and frequently ...lowest data delivery ... See full document

6

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several ...simultaneously. In this study, we developed a ... See full document

8

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... analyzed in NS2 ...well in Packet Delivery Fraction (PDF) but in some situations due to link breakage the PDF is ...low in state compared with AODV, Since AODV requires less energy for ... See full document

6

Vertical handover in vehicular ad-hoc networks - a survey

Vertical handover in vehicular ad-hoc networks - a survey

... factors in vehicular ad-hoc ...role in the handover process between the vehicles nodes during the vehicles are running on the ...algorithm in heterogeneous vehicular network is still a ... See full document

7

A Survey: variants of TCP in Ad-hoc networks

A Survey: variants of TCP in Ad-hoc networks

... Improvement in SACK through Forward Acknowledgement is known as TCP FACK ...amount in transit ...window in case of congestion ...sufficient data has gone from the ...Window. In the ... See full document

8

Achieving fault-tolerant consensus in ad hoc networks

Achieving fault-tolerant consensus in ad hoc networks

... wireless ad hoc ...the mobile devices in a MANET and it only uses the wireless broadcasting medium as the com- munication ...works in two tasks that execute ...ensured in rounds ... See full document

91

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

... packets in the network, which traverses through the network until it reaches the ...injected in the system at time t. A packet is queued at each node in its path where it waits for an opportunity to ... See full document

5

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... progress in disseminated and contained method, and are capable to scrutinize and acclimatize to alterations in transfer ...alterations in MANETs are greatly severe: Besides disparities in ... See full document

6

Show all 10000 documents...