Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.
Today's advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered: Big Data Cloud Application Services (SaaS) Cloud Security Hybrid Cloud Internet of Things (IoT) Private Cloud Public Cloud Service Oriented Architecture (SOA) Utility Computing Virtualization Technology
Routing and Wavelength Assignment (RWA) is a well known problem in Wavelength Division Multiplexing (WDM) networks. RWA problem is reported in the literature as a single objective ILP problem. In this article, we formulated the RWA problem as a multi objective ILP problem. An attempt is made to obtain a feasible solution using genetic algorithm (GA). The parameters considered for optimization are congestion among the individual lightpath requests, connection set up time, the number of intermediate hops traversed and the number of fibers used to honor the established connection requests. We considered ARPANET and NSFNET for our simulation.
Sensor nodes are tiny devices, with less computational power and memory capacity. For secure communication, the secret keys must be built into the nodes before deployment. Distribution of keys among the sensor nodes is a challenging task. Number of sensor nodes are usually much higher than the number of keys available. In this paper we use Steiner Triple system (STS) which is a combinatorial design to distribute the keys among the sensor nodes. As the keys are built into the nodes, no path key establishment phase is required for secure communication. Hence nodes can communicate using the built in secret keys. Thus, a faster communication is achieved. However, STS is not an appropriate candidate for large networks, where sensors are not within the communication range of each other. To overcome this we propose a cluster based key predistribution using Steiner Triple System. We evaluated the resiliency of our proposed system and found to have a better resiliency.Using dummy node concept the scalability of network can be increase.
In this new era of mobile communication, with the technological advancements, we have found out new alternatives to the traditional infrastructure-based networks, a MANET. A Mobile Ad hoc Network (MANET) is the cooperative engagement of mobile nodes without the required intervention of any centralized access point or existing infrastructure. However, this infrastructure-less nature of MANET makes it difficult in designing a foolproof security protocol. A number of protocols have been proposed in the literature for secure routing, but, most of these are either proactive or reactive in approch with their own limitations. In this book, we proposed a secure hybrid ad hoc routing protocol, called Secure Zone Routing Protocol (SZRP), which aims at addressing the above limitations by combining the best properties of both proactive and reactive approaches. The book details the design of the protocol and analyses its robustness in the presence of multiple possible security attacks that involves impersonation, modification, fabrication and replay of packets caused either by an external advisory or an internal compromised node within the network.
|
You may like...
|