当前位置:
首页
资源下载
![](/images/right.gif)
搜索资源 - ad hoc network security
搜索资源列表
-
0下载:
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced s
-
-
0下载:
网络安全是妨碍ad-hoc无线网络广泛应用的障碍之一。在许多安全问题中,鉴别是最基本的问题。我们提出一个新的体系叫做安全覆盖网络(SON)用于全分布式网络的识别。NPC可达性和模拟结果是我们相信我们的体系的有效性。-Network security is hampered ad-hoc wireless networks One of the obstacles to wider application. In many security issues, the identification o
-
-
0下载:
详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况
-Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer descr iption of the protocol algorithm used, problems,
-
-
0下载:
Reliable communication is mission critical to Emergency and Rescue operations.
MANET technology allowing communication where fixed infrastructure is not available
is very attractive for this setting. Emergency and Rescue operations may take place
-
-
0下载:
针对基于IBC的无线Ad hoc网络中的密钥管理存在的安全威胁,本文在分析所有节点均可以移动的无线网络组通信安全需求的基础上提出了分层的分布式组密钥管理框架。-For the IBC-based wireless Ad hoc network security threats exist in key management, this paper analysis of all nodes can be mobile wireless network group communication ba
-
-
0下载:
propose a new routing technique called Security-Aware
ad hoc Routing (SAR) that incorporates security attributes as parameters
into ad hoc route discovery. SAR enables the use of security as a negotiable
metric to improve the relevance of the r
-
-
0下载:
Mobile Communications: Network Protocols/Mobile IP
Data transfer, Encapsulation, Security
IPv6,Micro mobility support, DHCP
Ad-hoc networks, Routing protocols
-
-
0下载:
无线传感器网络安全技术,对于安全协议的学习有所帮助-Wireless sensor network security technology, security protocol for help in learning
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is
gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each
othe
-
-
0下载:
Security protocol for mobile ad hoc network and sensor network.
-
-
0下载:
Simulation of New Security Elements in an Ad Hoc Network
-
-
0下载:
security of routing in ad hoc mobile network
-
-
2下载:
ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。
www.1-fun.com 推荐-Simul
-
-
0下载:
Ad-hoc networks refer to temporary networks which form for special purposes. Mobile ad-hoc networks
(MANETs) are networks which use no network assisting element for routing, but every node has the role of
router and actively participates in data
-
-
0下载:
Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a
-
-
0下载:
提出了一种基于信任模型的机会路由协议,有效地保证了自组网网路的安全正常通信。弥补了机会路由协议中的安全隐患问题-This paper proposes a trust model based routing protocols, effectively guarantee the safety of AD hoc network normal communication.To make up for the safety problems in routing protocol opportun
-
-
0下载:
In our project we are going to provide security in mobile Ad hoc network in ibriCT staff wireless. So we are going to learn how to use Threshold cryptography and how strong this method is. Also we will configure how mobile phones are communicated.
-
-
0下载:
This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
-
-
0下载:
Security of uav ad hoc network
-
-
0下载:
Approach:
NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version,
-