The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the proliferation of group-oriented applications in mobile ad hoc networks (MANETs), users need suitable group key agreements to secure communication between group members. Because of users¡¦ mobility, group members join their group or leave frequently in MANETs. Due to each MANET has a unique, specific purpose, there typically is no central management mechanism. The utilization of resource,...
Securing access to data in temporal and location-based services and mobile applications requires the definition of temporal and location-based access-control systems. To cope with the temporal and location-based requirements, we propose a Temporal and Location-based RBAC (TLRBAC) model. In the TLRBAC model, temporal-period and spatial-location based entities are used to constrain the permissions of...
This paper studies the performance of adaptive vertical handoff schemes for overlayed WCDMA and wireless LAN (WLAN) heterogeneous networks. Simulation results show that the proposed adaptive hysteresis vertical handoff can increase lots of average data rate than the fixed hysteresis vertical handoff scheme. Moreover, the proposed adaptive hysteresis vertical handoff scheme can reduce the ping-pong...
This paper presents a secure destination-sequenced distance-vector routing protocol (SDSDV) for ad hoc mobile wireless networks. The proposed protocol is based on the regular DSDV protocol. Within SDSDV, each node maintains two one-way hash chains about each node in the network. Two additional fields, which we call AL (alteration) field and AC (accumulation) field, are added to each entry of the update...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.