Share
Secured Demand Routing for Mobile (in English)
Vijaya Kumar
(Author)
·
Meem Publishers
· Paperback
Secured Demand Routing for Mobile (in English) - Kumar, Vijaya
$ 24.80
$ 31.00
You save: $ 6.20
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My WishlistsIt will be shipped from our warehouse between
Monday, June 03 and
Tuesday, June 04.
You will receive it anywhere in United States between 1 and 3 business days after shipment.
Synopsis "Secured Demand Routing for Mobile (in English)"
Secured Demand Routing for Mobile is a communication protocol and network routing approach designed to enhance the security and efficiency of data transmission in mobile ad hoc networks (MANETs). MANETs are decentralized networks formed by mobile devices, such as smartphones, laptops, and tablets, that communicate with each other directly, without the need for a fixed infrastructure.In a mobile ad hoc network, securing data transmission is essential due to the dynamic nature of the network and the potential for malicious nodes or eavesdroppers to intercept or tamper with the data. Secured Demand Routing (SDR) aims to address these security challenges while optimizing data delivery in MANETs.Demand-Based Routing: SDR utilizes demand-based routing algorithms, where data packets are transmitted only when there is a specific request or demand for that data. This reduces unnecessary network traffic and improves efficiency.Authentication and Authorization: SDR incorporates robust authentication and authorization mechanisms to ensure that only authorized devices can participate in the network and access sensitive data.Encryption: Data encryption is employed to protect the confidentiality and integrity of the transmitted data, preventing unauthorized access or tampering.Secure Key Management: Efficient key management schemes are used to establish and distribute encryption keys securely among the participating nodes.Intrusion Detection and Prevention: SDR implements intrusion detection and prevention mechanisms to identify and respond to malicious activities or compromised nodes in real-time.Secure Neighbor Discovery: The protocol employs secure neighbor discovery mechanisms to identify and authenticate neighboring nodes before establishing communication links.
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.
✓ Producto agregado correctamente al carro, Ir a Pagar.