Libros importados con hasta 50% OFF + Envío Gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Secured Demand Routing for Mobile (in English)
Type
Physical Book
Language
English
Pages
164
Format
Paperback
Dimensions
22.9 x 15.2 x 0.9 cm
Weight
0.23 kg.
ISBN13
9787485597355

Secured Demand Routing for Mobile (in English)

Vijaya Kumar (Author) · Meem Publishers · Paperback

Secured Demand Routing for Mobile (in English) - Kumar, Vijaya

Physical Book

$ 24.80

$ 31.00

You save: $ 6.20

20% discount
  • Condition: New
It will be shipped from our warehouse between Monday, June 03 and Tuesday, June 04.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Secured Demand Routing for Mobile (in English)"

Secured Demand Routing for Mobile is a communication protocol and network routing approach designed to enhance the security and efficiency of data transmission in mobile ad hoc networks (MANETs). MANETs are decentralized networks formed by mobile devices, such as smartphones, laptops, and tablets, that communicate with each other directly, without the need for a fixed infrastructure.In a mobile ad hoc network, securing data transmission is essential due to the dynamic nature of the network and the potential for malicious nodes or eavesdroppers to intercept or tamper with the data. Secured Demand Routing (SDR) aims to address these security challenges while optimizing data delivery in MANETs.Demand-Based Routing: SDR utilizes demand-based routing algorithms, where data packets are transmitted only when there is a specific request or demand for that data. This reduces unnecessary network traffic and improves efficiency.Authentication and Authorization: SDR incorporates robust authentication and authorization mechanisms to ensure that only authorized devices can participate in the network and access sensitive data.Encryption: Data encryption is employed to protect the confidentiality and integrity of the transmitted data, preventing unauthorized access or tampering.Secure Key Management: Efficient key management schemes are used to establish and distribute encryption keys securely among the participating nodes.Intrusion Detection and Prevention: SDR implements intrusion detection and prevention mechanisms to identify and respond to malicious activities or compromised nodes in real-time.Secure Neighbor Discovery: The protocol employs secure neighbor discovery mechanisms to identify and authenticate neighboring nodes before establishing communication links.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews