The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ubiquitous network deals with wireless communication between service stations and users along with their mobility, invisibility and evolved smart space. In ubiquitous network, users get their services from available service stations invisibly. In such an open environment, an outsider malicious entity can disrupt the service communication by compromising the privacy of communicating users and(or) service...
Wireless communication system consists of wireless communicating entities that transmit data through bandwidth flexibly and conveniently. Wireless entities have the freedom to change their position which implies wireless communications support mobility in the system. With such benefits, wireless communication systems are challenged by many security issues. In this paper, we have prevented malicious...
Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a web...
Security is most essential for communication in ad-hoc network to secure data delivery between source node and destination node. A very well known harmful attack is Sybil attack where a node pretends multiple identities of several target nodes. In this paper, we have introduced an on-demand trusted approach to defend Sybil attack. We have chosen a on-demand routing protocol, AODV and proposed a trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.