The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we determine optimal topology update interval for fault tolerant k-edge connected topology update algorithm Local Tree-based Reliable Topology (LTRT) used in Mobile Ad-hoc Networks (MANETs). Topology update algorithms are periodically run on each participant node of MANET. This period called topology update interval (Δt), is chosen to be uniform. However, neither a high...
Secure and reliable group communication is an active area of research. Its popularity is fuelled by the growing importance of group-oriented and collaborative properties. The central research challenge is secure and efficient group key management. In this paper, we propose an efficient many-to-many group key management protocol in distributed group communication. This protocol is based on Elliptic...
Vehicular Ad Hoc Network (VANET) is formed by a number of moving vehicles that are equipped with wireless interfaces. It is a kind of Mobile Ad Hoc Network (MANET) in which communication takes place between moving vehicles on the road. VANETs are heterogeneous in nature as they provide wireless communication among moving vehicles (V2V) and vehicle to Road Side Units (RSU). It has become an exciting...
Recently, mobile collector or sink mobility has become an important research topic in WSNs. Data collector mobility can improve the performance of WSNs. Mobile sinks are mounted on some vehicles, animals or people moving randomly to collect information sensed by the sensor nodes where the data sink trajectories are changing or random. In the scenarios where the trajectories of the mobile collectors...
Mutual exclusion (Mutex) is a major coordination problem in distributed systems. To handle Mutex, the corresponding solutions are mainly classified into permission-based, token-based and quorum-based protocols. Mobile Ad-hoc Networks referred as MANETs introduce new obstacles for designing algorithms that help in solving distributed mutual exclusion problem. To our knowledge, few algorithms have been...
The group mutual exclusion problem is a simplification of mutual exclusion problem such that a set of processes in the similar group can enter a critical section all together. To handle group mutual exclusion, the interrelated solutions are chiefly classified into quorum-based, token-based as well as permission-based protocols. The proposed algorithm is based on tokens; a process that grasps a token...
Cloud computing is a technology which computes the resources and delivered as a service over a network in virtual form. Cloud computing is a bigger and broad concept which allows people to access the services through the use of internet from various devices. It has rapidly gained the popularity and captures the IT industries, colleges and institutes in recent years. Due to its advanced service benefits,...
Vehicular Ad Hoc Networks (VANET) is a variant of Mobile Ad Hoc Networks (MANET) in which communication nodes are mainly vehicles. VANETs are heterogeneous networks which provide wireless communication among vehicles and vehicle to Road Side Units (RSU). Now-a-days, it has become an interesting area of research as it is intended to improve Intelligent Transport System (ITS). To exploit effective communication...
As the power of cloud computing became prevalent in the recent years, more and more sensitive information is being now shifted to the cloud. The cloud is a computing service that charges the user according to usage of the computing resources. This pay-as-you-use feature is the hallmark in cloud computing. Security of data is a matter of concern and especially when cloud storage service is used. Encryption...
With the rise in the underground Internet economy, automated malicious programs popularly known as malwares have become a major threat to computers and information systems connected to the internet. Properties such as self healing, self hiding and ability to deceive the security devices make these software hard to detect and mitigate. Therefore, the detection and the mitigation of such malicious software...
A Wireless Sensor Network (WSN) has very specific characteristics and unique requirements. The fundamental function of a wireless sensor network is the collection of information from an area of interest. Information collected by the sensor nodes deployed in the network is processed by Base Station (BS) according to the applications. Wireless sensor networks have raised tremendous research interests...
In past few years a rapid growth of interest in Underwater Wireless Sensor Networks (UWSNs) have been observed due to its vital range of scientific exploration like early warning system for natural disasters, ecosystem monitoring, oil drilling, tactical military surveillance, undersea explorations and assisted navigation. Now research orientation is towards solving the issues related to the large...
IP spoofing based DDoS attack that relies on multiple compromised hosts in the network to attack the victim. In IP spoofing, IP addresses can be forged easily, thus, makes it difficult to filter illegitimate packets from legitimate one out of aggregated traffic. A number of mitigation techniques have been proposed in the literature by various researchers. The conventional Hop Count Filtering or probabilistic...
Modern cryptographic algorithm relies heavily on number theory and its various principles. In accordance to the time, the main emphasis has been on increasing the security quotient of the algorithm while keeping the operational cost minimum. Necessity of security algorithms is to maintain safety of business transactions and financial applications. RSA Algorithm is the most widely used cryptographic...
The mobility of nodes in a Mobile Ad hoc Network results in frequent changes of network topology making routing in MANETs a challenging task. The efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Some studies have been reported in the literature evaluating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.