36,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
18 °P sammeln
  • Broschiertes Buch

The migration to the wireless network from the wired network has been a global trend in the past few years. The scalability and mobility brought by wireless network made it possible in many applications. Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and distinctive applications. On the contrary to ancient spec, MANET doesn't need a set network infrastructure; every single node works as a transmitter and a receiver and they trust their neighbors to relay messages. Nodes communicate directly with each other when they are…mehr

Produktbeschreibung
The migration to the wireless network from the wired network has been a global trend in the past few years. The scalability and mobility brought by wireless network made it possible in many applications. Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and distinctive applications. On the contrary to ancient spec, MANET doesn't need a set network infrastructure; every single node works as a transmitter and a receiver and they trust their neighbors to relay messages. Nodes communicate directly with each other when they are both within the same transmission range. Or else, they rely on their neighbors to relay messages. However, the open medium and remote distribution of MANET create it at risk of numerous kinds of attacks. So, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. To tackle above problems, I proposed Enhanced Intrusion Detection System with On-Demand Routing Protocol using Hybrid Cryptographic Techniques for MANETs.
Autorenporträt
Avinab Marahattta ist Forschungsstipendiat am Institute of Computing Technology, Chinese Academy of Sciences, Peking, China. Zu seinen Forschungsinteressen gehören energieeffizientes Rechnen, Netzwerke für Rechenzentren, Computerarchitektur, verteilte und parallele Verarbeitung sowie Netzwerksicherheiten.