32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

This Must Be Performed study from a systemic model of Assessment and from an experimental comparison of protocols, based upon a simulation plat-form to enable Which Will Assess Their operation in closed-to-real operating conditions. The simulation platform will be equipped with the needed tools and components, in order to enable experimental evaluation of secure and intrusion tolerant protocol. These protocols combine mechanisms and defensive counter-measure against attacks on communications. They include Also Mechanisms to prevent specific routing attacks, which can be triggered from the…mehr

Produktbeschreibung
This Must Be Performed study from a systemic model of Assessment and from an experimental comparison of protocols, based upon a simulation plat-form to enable Which Will Assess Their operation in closed-to-real operating conditions. The simulation platform will be equipped with the needed tools and components, in order to enable experimental evaluation of secure and intrusion tolerant protocol. These protocols combine mechanisms and defensive counter-measure against attacks on communications. They include Also Mechanisms to prevent specific routing attacks, which can be triggered from the injection or from the replication of misbehaviour of operation, nodes in that have been subjected to intrusion attacks.The Major Contribution of this work is the design of an Innovative simulation environment. It will provide the opportunity to implement and evaluate routing algorithms are designed to be that secure but for which there are in the experiment studies on the robustness and real impact of designed security mechanisms. This evaluation will focus primarily on examining the effectiveness of the provided security mechanisms.
Autorenporträt
Tej Pal Singh has obtained her master of engg from Delhi College of Engg in 2010.he also a degree holder of Information Technology from BIET JHANSI. currently i am working in TIT Bhopal as a Assistant Professor in Information Technology, specializing wireless network.