Books > Computing & IT > Computer communications & networking
|
Buy Now
Mobile and Wireless Communications Networks - IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25-27, 2004 Paris, France (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Loot Price: R2,853
Discovery Miles 28 530
|
|
Mobile and Wireless Communications Networks - IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25-27, 2004 Paris, France (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Series: IFIP Advances in Information and Communication Technology, 162
Expected to ship within 10 - 15 working days
|
Mobile Ad hoc NETworks (MANETs) has attracted great research
interest in recent years. A Mobile Ad Hoc Network is a
self-organizing multi-hop wireless network where all hosts (often
called nodes) participate in the routing and data forwarding
process. The dependence on nodes to relay data packets for others
makes mobile ad hoc networks extremely susceptible to various
malicious and selfish behaviors. This point is largely overlooked
during the early stage of MANET research. Many works simply assume
nodes are inherently cooperative and benign. However, experiences
from the wired world manifest that the reverse is usually true; and
many works [3] [10] [9] [8] [12] [19] have pointed out that the
impact of malicious and selfish users must be carefully
investigated. The goal of this research is to address the
cooperation problem and related security issues in wireless ad hoc
networks. As a rule of thumb, it is more desirable to include
security mechanisms in the design phase rather than continually
patching the system for security breaches. As pointed out in [2]
[1], there can be both selfish and malicious nodes in a mobile ad
hoc network. Selfish nodes are most concerned about their energy
consumption and intentionally drop packets to save power. The
purpose of malicious nodes, on the other hand, is to attack the
network using various intrusive techniques. In general, nodes in an
ad hoc network can exhibit Byzantine behaviors.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.