32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Military organizations, similarly to other organizations that are concerned about the security of information exchanges, with high energy efficiency have always heavily relied on secure exchanges of short messages. A reliable system for such message exchanges is considered to be a particular strength for such organizations. In this book two protocols that are used, first one is Secure Message Transmission (SMT) protocol in order to secure the data transmission phase by tailoring an end-to-end secure data forwarding protocol to the MANET communication requirements and increase the reliability…mehr

Produktbeschreibung
Military organizations, similarly to other organizations that are concerned about the security of information exchanges, with high energy efficiency have always heavily relied on secure exchanges of short messages. A reliable system for such message exchanges is considered to be a particular strength for such organizations. In this book two protocols that are used, first one is Secure Message Transmission (SMT) protocol in order to secure the data transmission phase by tailoring an end-to-end secure data forwarding protocol to the MANET communication requirements and increase the reliability through transmitting the messages in multiple paths with minimal redundancy. As a second one Concentration is on Energy Efficient topology in Ad-hoc networks. The topology that is used in this case is Demand Based Energy efficient Topology (DBET) to reduce the energy consumption for Mobile Ad-hoc network, by dynamically adjusting the topology for various network traffic conditions. Simulations were conducted using the NS2 network simulator. Nodes in the network were configured to use 802.11 radios with a bandwidth of 2 Mbps and a nominal range of 250 m.
Autorenporträt
M.Tech Computer Networks and Information Security Department of SIT, JNTU University Hyderabad, India. Interested Area: Mobile Ad-hoc Networks, WS Network,Cloud computing, Security in Network.Technical: MCP,MCSA,MCSE,MCITP,CCNA,CCNP,RHCE Linux.IEEE Member from 2012Published more than 10 papers in National& International Conference and Journals.