Showing 1 - 10 of 14
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a...
Persistent link: https://www.econbiz.de/10012043268
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication...
Persistent link: https://www.econbiz.de/10012045707
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source...
Persistent link: https://www.econbiz.de/10012045713
This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each...
Persistent link: https://www.econbiz.de/10012046119
In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and eliminate the malicious nodes involved during routing path formation in mesh environments by doing some amendments in...
Persistent link: https://www.econbiz.de/10012046464
Persistent link: https://www.econbiz.de/10012394900
In current era, the trend of cloud computing is increasing with every passing day due to one of its dominant service i.e. Infrastructure as a service (IAAS), which virtualizes the hardware by creating multiple instances of VMs on single physical machine. Virtualizing the hardware leads to the...
Persistent link: https://www.econbiz.de/10012043269
This investigation focuses to develop an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic computer network model to study the transmission of malicious code in a computer network and derive the approximate threshold condition (basic reproduction number) to examine the equilibrium...
Persistent link: https://www.econbiz.de/10012043270
Cloud computing has revolutionized the working models of IT industry and increasing the demand of cloud resources which further leads to increase in energy consumption of data centers. Virtual machines (VMs) are consolidated dynamically to reduce the number of host machines inside data centers...
Persistent link: https://www.econbiz.de/10012045054
The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction of precomputed operations. Finding the more efficient technique compares to the most recent or efficient one is a...
Persistent link: https://www.econbiz.de/10012045705