Search
Now showing items 1-10 of 15
Secure data delivery in mobile ad hoc network using multiple paths
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
Cache performance evaluation in DSR protocol through cross-layering for mobile ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
Wireless mobile ad-hoc networks are being actively studied by many researchers these days. These networks are suitable to be used in various situations because of (i) their infrastructure-less property and (ii) the mobility ...
Testbed based experimental analysis of transport protocols over wireless ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
Ad hoc networks are networks with no infrastructure and self-organized in nature. ad hoc networks allow nodes to form network when they come into range of each other provided nodes are configured in ad hoc mode. But these ...
Security analysis of two fair exchange protocols
(Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
Comparative study between exponential back off and dynamic waiting strategies for medium access in wireless ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
IEEE 802.11 DCF (IEEE 802.11 Distributed Coordination Function) is widely used MAC protocol for wireless channel access. Although it is developed for single hop networks where all nodes are in the same radio range, it can ...
Cooperation enforcement mechanisms in wireless adhoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
Wireless adhoc networks are autonomous, infrastrutureless networks where there are no dedicated routers or base stations and nodes are expected to cooperate in Wireless performing routing duties to keep network connected. ...
Efficient ASIC implementation of advanced encryption standard
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...
Formal analysis of two standardized protocols using standard spaces
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
To achieve secure communication it is critical to provide protocols which are secure against attacks. Formal methods are helpful in finding whether or not a protocol is secure. The first formal method for this task, namely ...
Identifying small world network properties in ad-hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, ...
Performance analysis of TCP over enhanced UMTS network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
The increase in demand and overwhelming response of 3G mobile networks has made it a technology which would drive the future of mobile communication. On the other hand the popularity of the Internet has also increased with ...