Search
Now showing items 1-5 of 5
Secure data delivery in mobile ad hoc network using multiple paths
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
Performance evaluation of kerberos cross-realm authentication using SIMNET
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Today, the network is being implemented in such a manner that consist of geographi-
cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
Prolog based approach to reasoning about dynamic hierarchical key assignment schemes
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
Packet forwarding strategies for cooperation enforcement in mobile wireless ad hoc networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
In self-organized ad hoc networks, all networking functions rely on the contri-
bution of the relay nodes. Nodes have to forward packets for each other in order
to enable multi-hop communication. In recent years, researchers ...
Generalized data extraction protocol for habitat monitoring applications in WSNs
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Habitat monitoring applications use WSNs to gather data about environment and migration patterns of animals. This data is used by biologists to analyze the life and behavior of animals in different environments. The ...