Results 81 to 90 of about 1,346 (177)
The security and privacy of personal data have become a significant concern because of the vulnerability of wireless channels and the theft of sensitive information. Several security measures have been implemented in recent years to address this problem.
S. Vadhana Kumari +4 more
wiley +1 more source
AOMDV Protokolünde Black Hole Ataklara Karşı Geliştirilmiş Güvenlik Uygulaması
Iletisimin buyuk kismini olusturan kablosuz aglarin kullanimi hizli bir sekilde artmaktadir. Tasarsiz aglar siklikla hareketli dugumlerden olusan alt yapisiz kablosuz aglardir. Tasarsiz aglarda dugumler hem diger dugumlerle iletisim kurabilir hem de paketleri ileterek yonlendirici gorevi ustlenirler.
TOKLU, Sinan, AYDIN, Aziz
openaire +6 more sources
In order to improve the QoS for multimedia application,which focused on the delay-constrained and jit-ter-optimized traffic allocation problem in multipath routing.First of all,based on the network calculus theory,a deep analysis on the upper bound of ...
CHEN Zhi-gang1, ZENG Feng1, LI Qing-hua1
doaj +2 more sources
Exploiting the power of multiplicity: a holistic survey of network-layer multipath [PDF]
The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive
Ali, Anwaar +4 more
core +1 more source
PERBANDINGAN KINERJA PROTOKOL ROUTING MDAR DAN AOMDV PADA JARINGAN VANET [PDF]
VANET merupakan teknologi jaringan nirkabel yang dikhususkan untuk sistem komunikasi antar kendaraan. Pada VANET setiap kendaraan merupakan mobile node, di mana satu node dengan node lainnya harus dapat saling berkomunikasi. Proses komunikasi membutuhkan
Chairol Azliansyah
core
Multipath optimized link state routing for mobile ad hoc networks [PDF]
International audienceMultipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to ...
Abolhasan +11 more
core +6 more sources
Resource Allocation in Ad Hoc Networks
Unlike the centralized network, the ad hoc network does not have any central administrations and energy is constrained, e.g. battery, so the resource allocation plays a very important role in efficiently managing the limited energy in ad hoc networks ...
Zhou, Jihai, Zhou, Jihai
core +1 more source
A2OMDV : AN ADAPTIVE AD HOC ON-DEMAND MULTIPATH DISTANCE VECTOR ROUTING PROTOCOL USING DYNAMIC ROUTE SWITCHING [PDF]
Based on the reactive routing protocol, the AOMDV protocol extends the AODV protocol to discover multiple paths. However, the AOMDV based on static route selection can not handle the dynamic change of the network such as congestion and contention.
DUCKSOO SHIN +3 more
doaj
Load Balancing in MANET: Alleviating the center node [PDF]
Load balancing is an essential requirement of any multi-hop wireless network. A wireless routing protocol is accessed on its ability to distribute traffic over the network nodes and a good routing protocol achieves this without introducing un- acceptable
Sudheer, Depally Subash
core
Analysis of cyber risk and associated concentration of research (ACR)² in the security of vehicular edge clouds [PDF]
Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS.
Alhagagi, Hussam A. +6 more
core +1 more source

