The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
The emergence of wireless communities offers an attractive alternative to operator-centric models for providing broadband wireless services. While the first attempts of purely self-organized communities have been limited by the difficulty of attracting enough members willing to share their resources with the community, newer hybrid wireless communities (where a firm supports and incentivizes individuals...
Mobile Grid is one of the recent emerging technologies. It has a lot of challenges due to the scarcity of resources such as processing power, persistent storage, runtime heap, battery lifetime, memory, bandwidth, and connectivity and network faults. Dynamic environment affects both mobile and non-mobile grids. This creates a need for the virtual administrator. Virtual Organization (VO) is responsible...
Sensor networks are very important for military applications and in particular in battlefields. Sensors can collect very detailed information about enemy, its movements, weapons, and so forth. However, it is important that the information gathered by sensors arrives quickly to the destination, which could be moving objects such as tanks, solders, flying devices, and so on. The security of information...
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address cooperation stimulation in realistic yet challenging contexts where the environment is noisy and the underlying monitoring is imperfect. We have first explored the underlying reasons why stimulating cooperation under such...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.