Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET

Secure Self Re-Organizing of Nodes Using Closeness Technique in Cluster MANET
Author: C. Sathiya Kumar
Publisher: Anchor Academic Publishing
Total Pages: 189
Release: 2017-11-01
Genre: Computers
ISBN: 3960671857

Mobile ad hoc network (MANET) is defined as a self-configuring infrastructureless network used for communication by wireless links with the support of mobile devices. A MANET is referred to as a wireless network with independent nodes moving freely with respect to each other. Due to the independent free moves of nodes, a huge amount of packet data loss occurs in transmitting the packet from source to destination. The risk of node misbehaviour is extremely high. The unsecured ad hoc network environment is initiated due to the active nature of networks and node mobility. In addition, the task of key management is more complex in ad hoc network. Due to the nature of free moving characteristics, MANET faces improper node cooperation. The main reason behind ineffective node cooperation is presence of malicious or selfish nodes. Moreover, the existence of malicious unauthenticated nodes causes insecure communication. Hence, the proposed system aims in the development of proper node cooperation, malicious node detection and secure communication in MANET.

Mobile Ad Hoc Networking

Mobile Ad Hoc Networking
Author: Stefano Basagni
Publisher: John Wiley & Sons
Total Pages: 690
Release: 2013-02-07
Genre: Technology & Engineering
ISBN: 1118511239

"An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art." —E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applications, Mobile Ad Hoc Networking: Cutting Edge Directions offers useful tools for professionals and researchers in diverse areas wishing to learn about the latest trends in sensor, actuator, and robot networking, mesh networks, delay tolerant and opportunistic networking, and vehicular networks. Chapter coverage includes: Multihop ad hoc networking Enabling technologies and standards for mobile multihop wireless networking Resource optimization in multiradio multichannel wireless mesh networks QoS in mesh networks Routing and data dissemination in opportunistic networks Task farming in crowd computing Mobility models, topology, and simulations in VANET MAC protocols for VANET Wireless sensor networks with energy harvesting nodes Robot-assisted wireless sensor networks: recent applications and future challenges Advances in underwater acoustic networking Security in wireless ad hoc networks Mobile Ad Hoc Networking will appeal to researchers, developers, and students interested in computer science, electrical engineering, and telecommunications.

Cognitive Radio Sensor Networks: Applications, Architectures, and Challenges

Cognitive Radio Sensor Networks: Applications, Architectures, and Challenges
Author: Rehmani, Mubashir Husain
Publisher: IGI Global
Total Pages: 376
Release: 2014-06-30
Genre: Technology & Engineering
ISBN: 1466662131

"This book examines how wireless sensor nodes with cognitive radio capabilities can address these network challenges and improve the spectrum utilization, presenting a broader picture on the applications, architecture, challenges, and open research directions in the area of WSN research"--Provided by publisher.

Peer-to-Peer Systems and Applications

Peer-to-Peer Systems and Applications
Author: Ralf Steinmetz
Publisher: Springer Science & Business Media
Total Pages: 626
Release: 2005-09-29
Genre: Computers
ISBN: 354029192X

Starting with Napster and Gnutella, peer-to-peer systems became an integrated part of the Internet fabric attracting millions of users. This book provides an introduction to the field. It draws together prerequisites from various fields, presents techniques and methodologies, and gives an overview on the applications of the peer-to-peer paradigm.

Wireless Mesh Networks

Wireless Mesh Networks
Author: Mutamed Khatib
Publisher: Intechopen
Total Pages: 182
Release: 2020-05-13
Genre: Technology & Engineering
ISBN: 178985203X

The book discusses a very promising and effective approach in wireless communications called Wireless Mesh Networks (WMN) and its related issues. Meshes with external access capability, i.e. connected to the Internet, will be discussed. A full overview of WMNs with a technical assessment of mesh and multi-hop networking will be highlighted. Chapters in this book will provide a clear overview and summary and will evaluate some practical examples of upright mesh applications.

Guide to Wireless Ad Hoc Networks

Guide to Wireless Ad Hoc Networks
Author: Sudip Misra
Publisher: Springer Science & Business Media
Total Pages: 581
Release: 2009-03-02
Genre: Computers
ISBN: 1848003285

Overview and Goals Wireless communication technologies are undergoing rapid advancements. The past few years have experienced a steep growth in research in the area of wireless ad hoc networks. The attractiveness of ad hoc networks, in general, is attributed to their characteristics/features such as ability for infrastructure-less setup, minimal or no reliance on network planning and the ability of the nodes to self-organize and self-configure without the involvement of a centralized n- work manager, router, access point or a switch. These features help to set up a network fast in situations where there is no existing network setup or in times when setting up a fixed infrastructure network is considered infeasible, for example, in times of emergency or during relief operations. Even though ad hoc networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to scalability, quality-of-service, energy efficiency and security.

Ensuring Network Security through the Use of the Honeypot Technique

Ensuring Network Security through the Use of the Honeypot Technique
Author: Kuthadi Venu Madhav
Publisher: Cambridge Scholars Publishing
Total Pages: 161
Release: 2019-11-29
Genre: Computers
ISBN: 1527544087

In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path.

Ad Hoc and Sensor Networks

Ad Hoc and Sensor Networks
Author: Carlos de Morais Cordeiro
Publisher: World Scientific
Total Pages: 663
Release: 2011
Genre: Computers
ISBN: 9814338885

This book provides a comprehensive yet easy coverage of ad hoc and sensor networks and fills the gap of existing literature in this growing field. It emphasizes that there is a major interdependence among various layers of the network protocol stack. Contrary to wired or even one-hop cellular networks, the lack of a fixed infrastructure, the inherent mobility, the wireless channel, and the underlying routing mechanism by ad hoc and sensor networks introduce a number of technological challenges that are difficult to address within the boundaries of a single protocol layer. All existing textbooks on the subject often focus on a specific aspect of the technology, and fail to provide critical insights on cross-layer interdependencies. To fully understand these intriguing networks, one need to grasp specific solutions individually, and also the many interdependencies and cross-layer interactions.

Recent Advances in Cryptography and Network Security

Recent Advances in Cryptography and Network Security
Author: Pinaki Mitra
Publisher: BoD – Books on Demand
Total Pages: 70
Release: 2018-10-31
Genre: Computers
ISBN: 1789843456

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.

Pattern Recognition

Pattern Recognition
Author: Sergios Theodoridis
Publisher: Elsevier
Total Pages: 705
Release: 2003-05-15
Genre: Technology & Engineering
ISBN: 008051362X

Pattern recognition is a scientific discipline that is becoming increasingly important in the age of automation and information handling and retrieval. Patter Recognition, 2e covers the entire spectrum of pattern recognition applications, from image analysis to speech recognition and communications. This book presents cutting-edge material on neural networks, - a set of linked microprocessors that can form associations and uses pattern recognition to "learn" -and enhances student motivation by approaching pattern recognition from the designer's point of view. A direct result of more than 10 years of teaching experience, the text was developed by the authors through use in their own classrooms.*Approaches pattern recognition from the designer's point of view*New edition highlights latest developments in this growing field, including independent components and support vector machines, not available elsewhere*Supplemented by computer examples selected from applications of interest