The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
A logical key hierarchy (LKH) based key management approach is the most common way to manage a group key with less rekeying overhead. However, the LKH approach causes inefficiency of rekeying the group key in mobile cellular networks since it does not consider the characteristics of the networks, such as the cell-based network topology and the user's mobility. This paper proposes an efficient and...
A group key agreement (GKA) protocol is a mechanism to establish a cryptographic key for a group of participants, based on each onepsilas contribution, over a public network. In ad-hoc networks, the movement of the nodes may quickly change the topology resulting in the increased overhead during messaging for topology maintenance. The region-based schemes of ad-hoc networks, aim of handling topology...
Mobile adhoc network (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANET's are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of clear line defense. In this work we analyze the blackhole...
Lots of real-world complex networks have recently been discovered scale-free characteristic, which the degree distributions of those networks display power-law distribution. The properties of mobile ad-hoc network and the conception of scale-free network are introduced firstly. Then, we focus on the inherent mechanisms of scale-free characteristic in ad-hoc networks. And the influence of scale-free...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.