• Nenhum resultado encontrado

[PDF] Top 20 Secure Clustering in Vehicular Ad Hoc Networks

Has 10000 "Secure Clustering in Vehicular Ad Hoc Networks" found on our website. Below are the top 20 most common "Secure Clustering in Vehicular Ad Hoc Networks".

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... highlighted in [11] due to the usage of centralized certification authority was solved by using decentralized scheme and thus a secret sharing scheme known as proactive secret sharing is used in ad ... See full document

7

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

... In mobile ad hoc network, the communication would not be possible without the proper coverage among the nodes. Because the mobile nodes are changing their location very frequently, the communication ... See full document

9

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

... problem in MANET and it lacks security and reliability of ...role in any secure group communication architecture. Moreover in MANET, members can join and leave the group dynamically during the ... See full document

12

Using Real-World Car Traffic Dataset in Vehicular Ad Hoc Network Performance Evaluation

Using Real-World Car Traffic Dataset in Vehicular Ad Hoc Network Performance Evaluation

... studies in the domain of road traffic theory, one of the goals of this paper was to show that the MOCoPo data particularly fit to the evaluation of vehicular ad hoc networks in ... See full document

9

Service and auto-configuration framework for secure Ad-hoc environments in Android and Linux

Service and auto-configuration framework for secure Ad-hoc environments in Android and Linux

... links in ad-hoc networks is important. Support for an ad-hoc network where, for example, some nodes commu- nicate via ...single-hops. In order to attain multi-hop ... See full document

170

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... like Vehicular Ad hoc Networks ...BSP in MANETs based on realistic mobility model and Performance evaluation of an efficient counter-based scheme for mobile ad hoc ... See full document

11

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... routing in mobile ad hoc network (MANET) has also been given much attention by the researchers; many approaches, therefore, have been proposed to deal with external ...issue in communication ... See full document

12

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... process in Mobile Ad-Hoc networks (MANETs) is ...Mobile ad-hoc networks are a collocation of mobile wireless nodes that can operate without using focal access points, ... See full document

14

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... simulated in appropriate positions by making suitable modifications listed ...−1 in a 1000×1000 ...high, in order to verify the operation of the proposed IDS in various traffic ...out ... See full document

5

Proposed protocol for secured multi path routing in ad hoc networks

Proposed protocol for secured multi path routing in ad hoc networks

... the secure respect in these proposed Ad Hoc networks ...keys in advance. Secondly, in the Ad Hoc networks, the malicious node easily modifies the ... See full document

6

A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

... — Vehicular Ad Hoc Networks (VANETs) is an important component within the intelligent transportation systems (ITS) that have been part of global strategy and advanced ...coordinated. In ... See full document

5

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... for secure query processing in mobile databases has been presented in (Saha and Chowdhury, ...tuning in to that ...others in the same group. The undesirable aspect in this is, ... See full document

6

The Extended Clustering AD HOC Routing Protocol (ECRP)

The Extended Clustering AD HOC Routing Protocol (ECRP)

... Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed ...building, ad hoc networks have a lot of attractive applications ... See full document

8

SECURITY IN VEHICULAR AD HOC NETWORK BASED ON INTRUSION DETECTION SYSTEM

SECURITY IN VEHICULAR AD HOC NETWORK BASED ON INTRUSION DETECTION SYSTEM

... on vehicular networking which has gained a lot of ...systems in an efficient way. Vehicular Ad Hoc Networks (VANET) was created in October 2002 by the Federal ... See full document

10

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

Vehicle Assisted Data Delievery Technique To Control Data Dissemination In Vehicular AD - HOC Networks Vanets

... of vehicular networks on traffic safety and many commercial applications should be able to justify the ...a vehicular network, many delivery applications can be supported without extra hardware ... See full document

6

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... namic networks such as VANETs. On the other hand, index-based solutions, in which vehicles compute indices based on local information, require less computational ...network. In general, the dis- ... See full document

143

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

... data. In order to overcome the drawbacks of topology-based and geography based routing approaches, we propose the design protocol called Bio-inspired routing protocol for ...applications in various fields ... See full document

7

Vertical handover in vehicular ad-hoc networks - a survey

Vertical handover in vehicular ad-hoc networks - a survey

... low. In such situations, it is preferably transferred to an attachment point, and this will extend battery ...and in turn even the nearest AP or BS consumes more ... See full document

7

Vehicular Ad-hoc Networks

Vehicular Ad-hoc Networks

... efficiently in high vehicular environment. In this research work, the main emphasis is on the new IEEE ...setting, in a single hop and multi-hop environment where nodes are not directly ... See full document

8

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

... based Secure AODV that securely discovers and maintains the route. In our work we have assumed two levels of security: high and ...nodes in the route. In addition to this, the authenticity of ... See full document

17

Show all 10000 documents...