0
Your cart

Your cart is empty

Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications

Buy Now

Mobile and Wireless Communications Networks - IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25-27, 2004 Paris, France (Hardcover, 2005 ed.) Loot Price: R3,060
Discovery Miles 30 600
Mobile and Wireless Communications Networks - IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN...

Mobile and Wireless Communications Networks - IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks (MWCN 2004) October 25-27, 2004 Paris, France (Hardcover, 2005 ed.)

Elizabeth M. Belding-Royer, Khaldoun Al Agha, Guy Pujolle

Series: IFIP Advances in Information and Communication Technology, 162

 (sign in to rate)
Loot Price R3,060 Discovery Miles 30 600 | Repayment Terms: R287 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Donate to Gift Of The Givers

Mobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing multi-hop wireless network where all hosts (often called nodes) participate in the routing and data forwarding process. The dependence on nodes to relay data packets for others makes mobile ad hoc networks extremely susceptible to various malicious and selfish behaviors. This point is largely overlooked during the early stage of MANET research. Many works simply assume nodes are inherently cooperative and benign. However, experiences from the wired world manifest that the reverse is usually true; and many works [3] [10] [9] [8] [12] [19] have pointed out that the impact of malicious and selfish users must be carefully investigated. The goal of this research is to address the cooperation problem and related security issues in wireless ad hoc networks. As a rule of thumb, it is more desirable to include security mechanisms in the design phase rather than continually patching the system for security breaches. As pointed out in [2] [1], there can be both selfish and malicious nodes in a mobile ad hoc network. Selfish nodes are most concerned about their energy consumption and intentionally drop packets to save power. The purpose of malicious nodes, on the other hand, is to attack the network using various intrusive techniques. In general, nodes in an ad hoc network can exhibit Byzantine behaviors.

General

Imprint: Springer-Verlag New York
Country of origin: United States
Series: IFIP Advances in Information and Communication Technology, 162
Release date: October 2004
First published: 2005
Editors: Elizabeth M. Belding-Royer • Khaldoun Al Agha • Guy Pujolle
Dimensions: 235 x 155 x 28mm (L x W x T)
Format: Hardcover
Pages: 508
Edition: 2005 ed.
ISBN-13: 978-0-387-23148-8
Categories: Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
LSN: 0-387-23148-X
Barcode: 9780387231488

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners