The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is an effective approach for organizing computing resource which can improve service capability of WMNs remarkably. However, some drawbacks of wireless networks exist inherently make the cloud computing in WMNs insecure with various threats. In this paper, a novel hierarchical framework which is more compatible for cloud computing in WMNs is proposed, a completed security architecture...
Mobile business can only be used within the coverage area of the wireless networks at present. If there is some temporary utilization such as emergency business in disaster area and some conferences or link failure, the users cannot receive M-business services. Owing to the infrastructureless structure and self-organized feature of 4G system, this paper proposes 4G-based mobile business model supported...
Wireless networking is the preferred method for establishing new computer networks, more and more organizations and users are switching over to wireless communication because of its benefits such as flexibility and portability, increased productivity and low installation cost over wired networks. Therefore there are a growing number of regulatory requirements for the security of confidential data,...
Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today's cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the...
Security is of utmost importance in 4G and future generations wireless networks, and therefore the key success factor for commercial exploitation. This research is an attempt to design a security transition roadmap to 4G and future generations, incorporating the technical and business elements of the security issues which will affect the motivation and the challenges for its deployment, either from...
Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such...
The emergence of new mobile and wireless networks offers opportunities to expand traditional Internet applications. At the same time peer-to-peer systems become widely deployed and allow users to obtain and provide resources in a stable, scalable and reliable manner. In this paper we consider the deployment of P2P auctions over ad hoc networks. We propose a communication architecture and a protocol...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
The deployment of wireless networks is in permanent growth. To exploit their intrinsic mobility advantages, collaborative networks such as first responder networks (FRNs) have recently adopted wireless networking technologies, Albiet at a small scale. FRNs require the collaboration of heterogeneous and mobile groups. Impeding the wide-scale use of wireless networking in FRNs are the many security...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.