搜索资源列表
-
0下载:
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced s
-
-
0下载:
网络安全是妨碍ad-hoc无线网络广泛应用的障碍之一。在许多安全问题中,鉴别是最基本的问题。我们提出一个新的体系叫做安全覆盖网络(SON)用于全分布式网络的识别。NPC可达性和模拟结果是我们相信我们的体系的有效性。-Network security is hampered ad-hoc wireless networks One of the obstacles to wider application. In many security issues, the identification o
-
-
0下载:
Reliable communication is mission critical to Emergency and Rescue operations.
MANET technology allowing communication where fixed infrastructure is not available
is very attractive for this setting. Emergency and Rescue operations may take place
-
-
0下载:
针对基于IBC的无线Ad hoc网络中的密钥管理存在的安全威胁,本文在分析所有节点均可以移动的无线网络组通信安全需求的基础上提出了分层的分布式组密钥管理框架。-For the IBC-based wireless Ad hoc network security threats exist in key management, this paper analysis of all nodes can be mobile wireless network group communication ba
-
-
0下载:
Mobile Communications: Network Protocols/Mobile IP
Data transfer, Encapsulation, Security
IPv6,Micro mobility support, DHCP
Ad-hoc networks, Routing protocols
-
-
0下载:
无线传感器网络安全技术,对于安全协议的学习有所帮助-Wireless sensor network security technology, security protocol for help in learning
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is
gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each
othe
-
-
0下载:
Security protocol for mobile ad hoc network and sensor network.
-
-
0下载:
Simulation of New Security Elements in an Ad Hoc Network
-
-
0下载:
security of routing in ad hoc mobile network
-
-
2下载:
ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。
www.1-fun.com 推荐-Simul
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a
-
-
0下载:
Approach:
NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version,
-