Results 81 to 90 of about 1,346 (177)

RTO‐TV: Routed Tree Optimization and Trust‐Value‐Based Security Scheme to Prevent Black Hole Attack in MANET

open access: yesJournal of Sensors, Volume 2024, Issue 1, 2024.
The security and privacy of personal data have become a significant concern because of the vulnerability of wireless channels and the theft of sensitive information. Several security measures have been implemented in recent years to address this problem.
S. Vadhana Kumari   +4 more
wiley   +1 more source

AOMDV Protokolünde Black Hole Ataklara Karşı Geliştirilmiş Güvenlik Uygulaması

open access: yesBilişim Teknolojileri Dergisi, 2017
Iletisimin buyuk kismini olusturan kablosuz aglarin kullanimi hizli bir  sekilde artmaktadir. Tasarsiz aglar siklikla hareketli dugumlerden olusan  alt yapisiz kablosuz aglardir. Tasarsiz aglarda dugumler hem diger dugumlerle iletisim kurabilir hem de paketleri ileterek yonlendirici gorevi ustlenirler.
TOKLU, Sinan, AYDIN, Aziz
openaire   +6 more sources

Delay-constrained and jitter-optimized traffic allocation for multipath routing in wireless mesh networks

open access: yesTongxin xuebao, 2011
In order to improve the QoS for multimedia application,which focused on the delay-constrained and jit-ter-optimized traffic allocation problem in multipath routing.First of all,based on the network calculus theory,a deep analysis on the upper bound of ...
CHEN Zhi-gang1, ZENG Feng1, LI Qing-hua1
doaj   +2 more sources

Exploiting the power of multiplicity: a holistic survey of network-layer multipath [PDF]

open access: yes, 2015
The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive
Ali, Anwaar   +4 more
core   +1 more source

PERBANDINGAN KINERJA PROTOKOL ROUTING MDAR DAN AOMDV PADA JARINGAN VANET [PDF]

open access: yes, 2015
VANET merupakan teknologi jaringan nirkabel yang dikhususkan untuk sistem komunikasi antar kendaraan. Pada VANET setiap kendaraan merupakan mobile node, di mana satu node dengan node lainnya harus dapat saling berkomunikasi. Proses komunikasi membutuhkan
Chairol Azliansyah
core  

Multipath optimized link state routing for mobile ad hoc networks [PDF]

open access: yes, 2011
International audienceMultipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to ...
Abolhasan   +11 more
core   +6 more sources

Resource Allocation in Ad Hoc Networks

open access: yes, 2011
Unlike the centralized network, the ad hoc network does not have any central administrations and energy is constrained, e.g. battery, so the resource allocation plays a very important role in efficiently managing the limited energy in ad hoc networks ...
Zhou, Jihai, Zhou, Jihai
core   +1 more source

A2OMDV : AN ADAPTIVE AD HOC ON-DEMAND MULTIPATH DISTANCE VECTOR ROUTING PROTOCOL USING DYNAMIC ROUTE SWITCHING [PDF]

open access: yesJournal of Engineering Science and Technology, 2009
Based on the reactive routing protocol, the AOMDV protocol extends the AODV protocol to discover multiple paths. However, the AOMDV based on static route selection can not handle the dynamic change of the network such as congestion and contention.
DUCKSOO SHIN   +3 more
doaj  

Load Balancing in MANET: Alleviating the center node [PDF]

open access: yes, 2013
Load balancing is an essential requirement of any multi-hop wireless network. A wireless routing protocol is accessed on its ability to distribute traffic over the network nodes and a good routing protocol achieves this without introducing un- acceptable
Sudheer, Depally Subash
core  

Analysis of cyber risk and associated concentration of research (ACR)² in the security of vehicular edge clouds [PDF]

open access: yes, 2018
Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS.
Alhagagi, Hussam A.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy