Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the fast growth of various mobile terminals, the heterogeneous terminals that have different capabilities and resources are required and mixed in the deployment. Using this feature, we can improve the routing protocol. The available routing protocols for mobile Ad Hoc networks are designed mainly for homogeneous wireless networks. The heterogeneous wireless networks are now needed urgently in...
We propose a novel clustered routing approach with the separation of path findings from data transfer in wireless sensor networks. The proposed protocol differs the traditional clustered routing in the following aspects: global communication adopts multi-hop mode, cluster heads are only responsible for path findings, and data are transmitted by gateways. The principal advantage of the proposed routing...
High efficient routing is an important issue in the limited energy resource wireless sensor networks. Introducing Ant-colony algorithm, this paper proposes the wireless sensor network routing algorithm based on the LEACH. During the construction of sensor network clusters, only the nodes whose residual energy is higher than the average energy can be chosen as the cluster heads to avoid the node premature...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol(HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand source routing protocols in MANET, and a new routing protocol, called endairA, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of secure route in the model, and the flaw in the proof for...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol (HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of correct system state in the model, and the flaw in the...
We propose a new aggregate signature scheme from bilinear pairings. It requires constant pairing operations in the verification and the size of aggregate signature is independent of the number of signers. In the public key infrastructure (PKI) setting, it is the first aggregate signature scheme with these properties. Hence, it is very practical in the environments with computational power limited...
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.