Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
| Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li |
| Autore | Zeng Kai |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2011 |
| Descrizione fisica | 1 online resource (307 p.) |
| Disciplina | 621.387/82 |
| Altri autori (Persone) |
LouWenjing
LiMing <1985-> |
| Collana | Wiley series on wireless communications and mobile computing |
| Soggetto topico |
Ad hoc networks (Computer networks)
Radio relay systems |
| ISBN |
1-283-17782-X
9786613177827 1-119-97360-0 1-119-97361-9 |
| Classificazione | TEC041000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Series Editors -- Preface -- List of Abbreviations -- 1 Introduction -- 1.1 Multihop wireless networks -- 1.2 Routing challenges in MWNs -- 1.3 Routing techniques in MWNs -- 1.4 Related work -- 1.5 Book contribution -- 1.6 System model and assumptions -- References -- 2 Taxonomy of opportunistic routing: principles and behaviors -- 2.1 EPA generalization -- 2.2 Principles of local behavior of GOR -- 2.3 Least cost opportunistic routing -- 2.4 Conclusions -- References -- 3 Energy efficiency of geographic opportunistic routing -- 3.1 EGOR problem formulation -- 3.2 Efficient localized node-selection algorithms -- 3.3 Energy-efficient geographic opportunistic routing -- 3.4 Performance evaluation -- 3.5 Conclusion -- References -- 4 Capacity of multirate opportunistic routing -- 4.1 Computing throughput bound of OR -- 4.2 Impact of transmission rate and forwarding strategy on throughput -- 4.3 Rate and candidate selection schemes -- 4.4 Performance evaluation -- 4.5 Conclusion -- References -- 5 Multiradio multichannel opportunistic routing -- 5.1 Introduction -- 5.2 System model and opportunistic routing primer -- 5.3 Problem formulation -- 5.4 Forwarding priority scheduling -- 5.5 Performance evaluation 1 -- 5.6 Conclusions and future work -- References -- 6 Medium access control for opportunistic routing - candidate coordination -- 6.1 Existing candidate coordination schemes -- 6.2 Design and analysis of FSA -- 6.3 Simulation results and evaluation -- 6.4 Conclusions -- References -- 7 Integration of opportunistic routing and network coding -- 7.1 A brief review of MORE -- 7.2 Mobile content distribution in VANETs -- 7.3 Related works on mobile content distribution in VANETs -- 7.4 Background on symbol-level network coding -- 7.5 CodeOn: a cooperative popular content broadcast scheme for VANETs based on SLNC -- 7.6 CodePlay: a live multimedia streaming scheme for VANETs based on SLNC -- 7.7 Conclusion -- References -- 8 Multirate geographic opportunistic routing protocol design.
8.1 System model -- 8.2 Impact of transmission rate and forwarding strategy on OR performance -- 8.3 Opportunistic effective one-hop throughput (OEOT) -- 8.4 Heuristic candidate selection algorithm -- 8.5 Multirate link-quality measurement -- 8.6 Performance evaluation -- 8.7 Conclusion -- References -- 9 Opportunistic routing security -- 9.1 Attack on link quality measurement -- 9.2 Attacks on opportunistic coordination protocols -- 9.3 Resilience to packet-dropping attack -- 9.4 Conclusion -- References -- 10 Opportunistic broadcasts in vehicular networks -- 10.1 Related works on broadcasts in general MWNs -- 10.2 Related works on broadcasts in VANETs -- 10.3 Problem statement -- 10.4 Overview of OppCast -- 10.5 OppCast: main design -- 10.6 Parameter optimization -- 10.7 Performance evaluation -- 10.8 Conclusion -- References -- 11 Conclusions and future research -- 11.1 Summary -- 11.2 Future research directions -- References -- Index. |
| Record Nr. | UNINA-9910139634303321 |
Zeng Kai
|
||
| Hoboken, New Jersey : , : Wiley, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li
| Multihop wireless networks : opportunistic routing / / Kai Zeng, Wenjing Lou, Ming Li |
| Autore | Zeng Kai |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2011 |
| Descrizione fisica | 1 online resource (307 p.) |
| Disciplina | 621.387/82 |
| Altri autori (Persone) |
LouWenjing
LiMing <1985-> |
| Collana | Wiley series on wireless communications and mobile computing |
| Soggetto topico |
Ad hoc networks (Computer networks)
Radio relay systems |
| ISBN |
1-283-17782-X
9786613177827 1-119-97360-0 1-119-97361-9 |
| Classificazione | TEC041000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Series Editors -- Preface -- List of Abbreviations -- 1 Introduction -- 1.1 Multihop wireless networks -- 1.2 Routing challenges in MWNs -- 1.3 Routing techniques in MWNs -- 1.4 Related work -- 1.5 Book contribution -- 1.6 System model and assumptions -- References -- 2 Taxonomy of opportunistic routing: principles and behaviors -- 2.1 EPA generalization -- 2.2 Principles of local behavior of GOR -- 2.3 Least cost opportunistic routing -- 2.4 Conclusions -- References -- 3 Energy efficiency of geographic opportunistic routing -- 3.1 EGOR problem formulation -- 3.2 Efficient localized node-selection algorithms -- 3.3 Energy-efficient geographic opportunistic routing -- 3.4 Performance evaluation -- 3.5 Conclusion -- References -- 4 Capacity of multirate opportunistic routing -- 4.1 Computing throughput bound of OR -- 4.2 Impact of transmission rate and forwarding strategy on throughput -- 4.3 Rate and candidate selection schemes -- 4.4 Performance evaluation -- 4.5 Conclusion -- References -- 5 Multiradio multichannel opportunistic routing -- 5.1 Introduction -- 5.2 System model and opportunistic routing primer -- 5.3 Problem formulation -- 5.4 Forwarding priority scheduling -- 5.5 Performance evaluation 1 -- 5.6 Conclusions and future work -- References -- 6 Medium access control for opportunistic routing - candidate coordination -- 6.1 Existing candidate coordination schemes -- 6.2 Design and analysis of FSA -- 6.3 Simulation results and evaluation -- 6.4 Conclusions -- References -- 7 Integration of opportunistic routing and network coding -- 7.1 A brief review of MORE -- 7.2 Mobile content distribution in VANETs -- 7.3 Related works on mobile content distribution in VANETs -- 7.4 Background on symbol-level network coding -- 7.5 CodeOn: a cooperative popular content broadcast scheme for VANETs based on SLNC -- 7.6 CodePlay: a live multimedia streaming scheme for VANETs based on SLNC -- 7.7 Conclusion -- References -- 8 Multirate geographic opportunistic routing protocol design.
8.1 System model -- 8.2 Impact of transmission rate and forwarding strategy on OR performance -- 8.3 Opportunistic effective one-hop throughput (OEOT) -- 8.4 Heuristic candidate selection algorithm -- 8.5 Multirate link-quality measurement -- 8.6 Performance evaluation -- 8.7 Conclusion -- References -- 9 Opportunistic routing security -- 9.1 Attack on link quality measurement -- 9.2 Attacks on opportunistic coordination protocols -- 9.3 Resilience to packet-dropping attack -- 9.4 Conclusion -- References -- 10 Opportunistic broadcasts in vehicular networks -- 10.1 Related works on broadcasts in general MWNs -- 10.2 Related works on broadcasts in VANETs -- 10.3 Problem statement -- 10.4 Overview of OppCast -- 10.5 OppCast: main design -- 10.6 Parameter optimization -- 10.7 Performance evaluation -- 10.8 Conclusion -- References -- 11 Conclusions and future research -- 11.1 Summary -- 11.2 Future research directions -- References -- Index. |
| Record Nr. | UNINA-9910815410103321 |
Zeng Kai
|
||
| Hoboken, New Jersey : , : Wiley, , 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
| Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (592 pages) |
| Disciplina |
005.8
005.8 (edition:23) |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Application software Data and Information Security Computer Engineering and Networks Computing Milieux Computer and Information Systems Applications |
| ISBN | 3-030-37228-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Trustless Framework for Iterative Double Auction based on Blockchain -- Towards a Multi-Chain Future of Proof-of-Space -- Secure Consistency Verification for Untrusted CloudStorage by Public Blockchains -- 4 An Enhanced Verifiable Inter-domain Routing Protocol based on Blockchain -- Edge-Assisted CNN Inference over Encrypted Data forInternet of Things -- POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices -- USB-Watch: A Dynamic Hardware-Assisted USB ThreatDetection Framework -- Automated IoT Device Fingerprinting Through Encrypted Stream Classification -- Catching Malware.-DeepCG: Classifying Metamorphic Malware through Deep Learning of Call Graphs -- ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation.-Obfusifier: Obfuscation-Resistant Android Malware Detection System -- Closing the Gap with APTs through Semantic Clusters and Automated CybergamesMachine Learning -- Stochastic ADMM Based Distributed Machine Learning with Differential Privacy -- Topology-Aware Hashing for Effective Control Flow GraphSimilarity Analysis -- Trojan Attack on Deep Generative Models in Autonomous Driving -- FuncNet: A Euclidean Embedding Approach forLightweight Cross-platform Binary Recognition Everything Traffic Security -- Towards Forward Secure Internet Traffic -- Traffic-based Automatic Detection of BrowserFingerprinting -- Measuring Tor Relay Popularity -- SoK: ATT&CK Techniques and Trends in Windows -- MalwareCommunicating Covertly -- Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts -- Victim-Aware Adaptive Covert Channels.-Random Allocation Seed-DSSS Broadcast Communication against Jamming Attacks -- Loss-tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication ofAnti-tracking Network -- Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs -- Decentralized Privacy-Preserving Reputation Managementfor Mobile Crowdsensing -- Location Privacy Issues in the OpenSky Network Crowdsourcing Platform -- Privacy-Preserving Genomic Data Publishing viaDifferentially-Private Suffix Tree -- Deep Analytics -- TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.-Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks -- Application Transiency: Towards a Fair Trade of Personal Information for Application Services. |
| Record Nr. | UNINA-9910364952503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen
| Security and Privacy in Communication Networks : 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II / / edited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (514 pages) |
| Disciplina | 005.8 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Application software Data and Information Security Computer Engineering and Networks Computing Milieux Computer and Information Systems Applications |
| ISBN | 3-030-37231-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910364952403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||