• Nenhum resultado encontrado

[PDF] Top 20 A survey on different aspects of network security in wired and wireless networks

Has 10000 "A survey on different aspects of network security in wired and wireless networks" found on our website. Below are the top 20 most common "A survey on different aspects of network security in wired and wireless networks".

A survey on different aspects of network security in wired and wireless networks

A survey on different aspects of network security in wired and wireless networks

... Abstract- Network Security has become very crucial these days where the communication speed has been increasing at rapid rate that data travels from one part of the world to another in couple ... See full document

9

Requirements of Vertical Handoff Mechanism in 4G Wireless Networks

Requirements of Vertical Handoff Mechanism in 4G Wireless Networks

... heterogeneous wireless networks ( ADDMVHO) ...“best” network at “best” time among available networks based on dynamic factors such as RSS and velocity of mobile station as ... See full document

10

Security threats, effects and recovery methods on wireless adhoc sensor networks

Security threats, effects and recovery methods on wireless adhoc sensor networks

... consists of recording traffic from one region of the network and replaying it in a different region ...kind of attack supplies the legitimate motes with bogus routing ... See full document

6

Load Balancing in Wireless Mesh Network: a Survey

Load Balancing in Wireless Mesh Network: a Survey

... wireless network has only a single hop of the path and the Clients need to be within a single hop to make connectivity with wireless access ...such networks need access points ... See full document

5

A Survey on Vertical Handover Decision Framework In Heterogenious Wireless Networks

A Survey on Vertical Handover Decision Framework In Heterogenious Wireless Networks

... framework in a network simulation, we a software called ...based and modular simulation ...Modular Network Test bed in ...classes. In this each module communicate with each other ... See full document

11

Security Attacks and its Countermeasures in Wireless Sensor  Networks

Security Attacks and its Countermeasures in Wireless Sensor Networks

... information. Of course, the strength of the encryption depends on various ...faster and needs more ...data in transmission. There are basically two categories of cryptographic ... See full document

12

Security Issues in Wireless Sensor Networks: Attacks and Countermeasures

Security Issues in Wireless Sensor Networks: Attacks and Countermeasures

... the network stealthily since they can avoid our authentication and authorization because they are legitimate nodes of the native network and have access to the network ... See full document

6

A Survey on Energy Efficiency for Wireless Mesh Network

A Survey on Energy Efficiency for Wireless Mesh Network

... management of WMNs to minimize the energy in a time-varying dynamically by choosing a subset of base stations to switch the mesh examination matters cover the service zone, traffic routing, as well ... See full document

20

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

A Survey on Protocols and Routing Algorithms for Wireless Sensor Networks

... Abstract: Wireless Sensor Networks (WSNs) are networks of small and tiny lightweight nodes that are randomly deployed in a large area where it is not possible to monitor ... See full document

4

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

... based wireless mesh networks (WMNs) have been mainly investigated for extending wireless transmission throughput ...quality of the one point to many points transmission in the ... See full document

7

Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues

Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues

... set of applications for MANETS is diverse, ranging from small, static networks that are constrained by power sources, to large-scale, mobile, highly dynamic ...design of network protocols for ... See full document

9

Wireless Sensor Networks for Building Robotic Paths - A Survey of Problems and Restrictions

Wireless Sensor Networks for Building Robotic Paths - A Survey of Problems and Restrictions

... some of the challenges described a practical scenario was proposed, in which a robot node deploys a wireless sensor ...interference and collection of real- world data in ... See full document

12

Security protection across network based attacks in mesh networks

Security protection across network based attacks in mesh networks

... unavailability of its network services. Examples of DoS attacks at different protocol layers are channel jamming, wormhole attack, Sybil attack, black hole, and grey hole ...attacks. ... See full document

9

Configurable Link Layer Security Architecture for Wireless Sensor Networks

Configurable Link Layer Security Architecture for Wireless Sensor Networks

... [11], in [7]. MiniSec follows a different approach in that it offers two operating modes, one tailored for single source communication, whereas the other, for multi-source broadcast ...layer ... See full document

5

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

A Survey on Fuzzy Based Clustering Routing Protocols in Wireless Sensor Networks: A New Viewpoint

... Based on network structure, routing protocols in WSNs can be coarsely divided into two categories: flat routing and hierarchical ...routing. In a flat topology, all nodes perform the ... See full document

5

Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment

Efficacy of Attack Detection Capability of IDPS Based on its Deployment in Wired and Wireless Environment

... described in previous section, logging agent with the help of network interceptor and Suricata inspects traffic to check whether exploit has been ...four different kinds of ... See full document

13

Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment

Analysis of Secure Real Time Transport Protocol on VoIP over Wireless LAN in Campus Environment

... Abstract- In this research, we propose to implement Secure Real Time Transport Protocol (SRTP) on VoIP services in campus ...deployment of VoIP in campus environment over ... See full document

5

A Review on Congestion control Mechanisms in Wireless Sensor Networks

A Review on Congestion control Mechanisms in Wireless Sensor Networks

... Sensor Networks (WSNs) [1] consist of one or more sinks and large number of sensor nodes scattered in an ...capabilities of information sensing, computation, and ... See full document

6

Paper Survey of Different Energy Efficient Schemes in Wireless Ad hoc Network

Paper Survey of Different Energy Efficient Schemes in Wireless Ad hoc Network

... amount of energy that is being consumed by the network also determines how long the network can work A probability function in energy-aware routing is used as a means of choosing ... See full document

7

Projeto de redes Ad Hoc sem fio ciente de topologia

Projeto de redes Ad Hoc sem fio ciente de topologia

... metrics of Wireless Ad Hoc Networks and the network ...interested in applying different concepts and metrics related to the network topology to three differ- ... See full document

213

Show all 10000 documents...