• Nenhum resultado encontrado

[PDF] Top 20 Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

Has 10000 "Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks " found on our website. Below are the top 20 most common "Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks ".

Identification of Closest and Phantom Nodes in Mobile Ad Hoc  Networks

Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

... address, and 3) it contains a public key K 0s taken from S’s pool of anonymous one-time use keys that do not allow neighbors to map the key onto a specific ...identity of the verifier hidden is ... See full document

10

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

... capable of detecting and removing the malicious nodes launching these two types of ...consists of an algorithm which works as follows. Instead of sending the total data traffic ... See full document

6

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access ...proactive ... See full document

5

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... contention and collision in blind ...introduced in the study utilizes a dynamic probabilistic broadcast coupled with the neighbor ...number of nodes that is kept in the neighbor ... See full document

6

Mobile ad hoc networks tcp performance and comparison over routing protocols

Mobile ad hoc networks tcp performance and comparison over routing protocols

... Abstract- Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical ... See full document

9

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... process in Mobile Ad-Hoc networks (MANETs) is ...presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can ... See full document

14

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

... The mobile nodes in MANET are located randomly and continuously changing their positions in ...among mobile nodes are also changing frequently. Such networks are ... See full document

6

Shared Information Based Security Solution for Mobile Ad hoc Networks

Shared Information Based Security Solution for Mobile Ad hoc Networks

... term Mobile Ad hoc Networks (MANETs) is used for the ad hoc wireless local area networks (Ad hoc WLAN) by the Internet Engineering Task Force (IETF) wherein ... See full document

12

Proposed protocol for secured multi path routing in ad hoc networks

Proposed protocol for secured multi path routing in ad hoc networks

... common mobile network usually appears in forms, such as the cellular network or the wireless local area ...communication of portable terminal must finish with the aid of base station ... See full document

6

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... Umaparvathi and Varughese in [9] presented a comparison of the most commonly used symmetric encryption algorithms AES (Rijndael), DES, 3DES and Blowfish in terms of power ... See full document

13

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... consisting of mobile nodes such as Laptop, PDAs and wireless phones with the characteristics of self-organization and self-configuration ...[6]. Mobile ad ... See full document

4

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... data of situational awareness on the battleground, in corporate houses where employees or associates sharing information inside the company premises or in a meeting hall; attendees using wireless ... See full document

8

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... a mobile social scenario in which nodes forward their content to their neighbors using opportunistic ...profile and preferences instead of relying on the proximity of the ... See full document

143

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

... simulations in Network Simulator-2 [71] to study the performance of the five categories of opportunistic ...100 nodes in a uniformly distributed network ...bytes and the ... See full document

9

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... route in QAODV and during this period of time, the source which keeps on sending packets from the application layer of the node, it cause drops of packets at the end of the queue ... See full document

7

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... Mobile ad hoc networks are IP networks made up of a collection of wireless and mobile nodes communicating via radio ...[2] and could, for ... See full document

7

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... analyzed in NS2 2.34 for AODV and DSDV protocol by increasing the density of ...well in Packet Delivery Fraction (PDF) but in some situations due to link breakage the PDF is ...number ... See full document

6

A Survey: variants of TCP in Ad-hoc networks

A Survey: variants of TCP in Ad-hoc networks

... (Mobile Ad-hoc network) forms a temporary network of wireless mobile nodes without any infrastructure where all nodes are allowed to move freely, configure themselves ... See full document

8

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... progress in disseminated and contained method, and are capable to scrutinize and acclimatize to alterations in transfer ...alterations in MANETs are greatly severe: Besides ... See full document

6

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

... Mobile Ad hoc Networks are open, shared, dynamic and self-organized ...use in emergency and recue scenarios where the sharing of information is ...necessary. ... See full document

15

Show all 10000 documents...