top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Bio-inspired routing protocols for vehicular ad-hoc networks / / Salim Bitam, Abdelhamid Mellouk
Bio-inspired routing protocols for vehicular ad-hoc networks / / Salim Bitam, Abdelhamid Mellouk
Autore Bitam Salim
Pubbl/distr/stampa London, England : , : Wiley, , [2014]
Descrizione fisica 1 online resource (127 pages)
Disciplina 388.3124
Collana Focus series
Soggetto topico Vehicular ad hoc networks (Computer networks)
Routing protocols (Computer network protocols)
ISBN 9781119004967 (electronic book)
1-119-00813-1
1-119-00496-9
1-119-00812-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover page; Half-Title page ; Title page; Copyright page; Contents; Preface; Introduction; Acronyms and Notations; 1: Vehicular Ad Hoc Networks; 1.1. VANET definition, characteristics and applications; 1.1.1. Definition of vehicular ad hoc network; 1.1.2. Characteristics of vehicular ad hoc networks; 1.1.2.1. Vehicle velocity; 1.1.2.2. VANET density; 1.1.2.3. Node heterogeneity; 1.1.2.4. Mobility model; 1.1.3. Applications of vehicular ad hoc networks; 1.1.3.1. Road safety applications; 1.1.3.2. Vehicular authority services; 1.1.3.3. Enhanced driving
1.1.3.4. Business and entertainment services1.2. VANET architectures; 1.2.1. Vehicular WLAN/cellular architecture; 1.2.2. Pure ad hoc architecture; 1.2.3. Hybrid architecture; 1.3. Mobility models; 1.3.1. Random-based mobility models; 1.3.1.1. Random waypoint mobility model; 1.3.1.2. Random walk mobility model; 1.3.1.3. Limitations of random-based mobility models; 1.3.2. Geographic map-based mobility models; 1.3.2.1. Manhattan grid mobility model; 1.3.2.2. City section mobility model; 1.3.2.3. Freeway mobility model; 1.3.2.4. Limitations of geographic map-based mobility models
1.3.3. Group-based mobility1.3.3.1. Reference point group mobility model; 1.3.3.2. Virtual track mobility model; 1.3.3.3. Limitations of group-based mobility model; 1.3.4. Prediction-based mobility models; 1.3.4.1. Gauss-Markov based mobility model; 1.3.4.2. Markov-History based mobility model; 1.3.4.3. Discussion of prediction-based mobility models; 1.3.5. Software-tools-based mobility models; 1.3.5.1. SUMO framework; 1.3.5.2. VanetMobiSim framework; 1.3.5.3. MOVE framework; 1.3.5.4. Discussion of software-tools-based mobility models; 1.4. VANET challenges and issues; 1.4.1. VANET routing
1.4.2. Vehicular network scalability1.4.3. Computational complexity in VANET networking; 1.4.4. Routing robustness and self-organization in vehicular networks; 1.4.5. Vehicular network security; 1.5. Bibliography; 2: Routing for Vehicular Ad Hoc Networks; 2.1. Basic concepts; 2.1.1. Single-hop versus multi-hop beaconing in VANETs; 2.1.1.1. Single-hop beaconing; 2.1.1.2. Multi-hop beaconing; 2.1.2. Routing classification of VANETs; 2.1.2.1. Topology-based routing; 2.1.2.1.1. Proactive routing; 2.1.2.1.2. Reactive routing; 2.1.2.1.3. Hybrid routing; 2.1.2.2. Geography-based routing
2.1.2.3. Cluster-based routing2.2. Quality-of-service of VANET routing; 2.2.1. Quality-of-service definition; 2.2.2. Quality-of-service criteria; 2.2.2.1. Average end-to-end delay (measured in milliseconds); 2.2.2.2. Average jitter (measured in milliseconds); 2.2.2.3. Average available bandwidth (measured in KB/s); 2.2.2.4. Packet delivery ratio; 2.2.2.5. Normalized overhead load; 2.3. VANET routing standards; 2.3.1. Dedicated short range communication; 2.3.2. Standards for wireless access in vehicular environments (WAVE); 2.3.3. VANET standards related to routing layers
2.3.3.1. Controller area network (ISO 11898)
Record Nr. UNINA-9910132163003321
Bitam Salim  
London, England : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bio-inspired routing protocols for vehicular ad-hoc networks / / Salim Bitam, Abdelhamid Mellouk
Bio-inspired routing protocols for vehicular ad-hoc networks / / Salim Bitam, Abdelhamid Mellouk
Autore Bitam Salim
Pubbl/distr/stampa London, England : , : Wiley, , [2014]
Descrizione fisica 1 online resource (127 pages)
Disciplina 388.3124
Collana Focus series
Soggetto topico Vehicular ad hoc networks (Computer networks)
Routing protocols (Computer network protocols)
ISBN 9781119004967 (electronic book)
1-119-00813-1
1-119-00496-9
1-119-00812-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover page; Half-Title page ; Title page; Copyright page; Contents; Preface; Introduction; Acronyms and Notations; 1: Vehicular Ad Hoc Networks; 1.1. VANET definition, characteristics and applications; 1.1.1. Definition of vehicular ad hoc network; 1.1.2. Characteristics of vehicular ad hoc networks; 1.1.2.1. Vehicle velocity; 1.1.2.2. VANET density; 1.1.2.3. Node heterogeneity; 1.1.2.4. Mobility model; 1.1.3. Applications of vehicular ad hoc networks; 1.1.3.1. Road safety applications; 1.1.3.2. Vehicular authority services; 1.1.3.3. Enhanced driving
1.1.3.4. Business and entertainment services1.2. VANET architectures; 1.2.1. Vehicular WLAN/cellular architecture; 1.2.2. Pure ad hoc architecture; 1.2.3. Hybrid architecture; 1.3. Mobility models; 1.3.1. Random-based mobility models; 1.3.1.1. Random waypoint mobility model; 1.3.1.2. Random walk mobility model; 1.3.1.3. Limitations of random-based mobility models; 1.3.2. Geographic map-based mobility models; 1.3.2.1. Manhattan grid mobility model; 1.3.2.2. City section mobility model; 1.3.2.3. Freeway mobility model; 1.3.2.4. Limitations of geographic map-based mobility models
1.3.3. Group-based mobility1.3.3.1. Reference point group mobility model; 1.3.3.2. Virtual track mobility model; 1.3.3.3. Limitations of group-based mobility model; 1.3.4. Prediction-based mobility models; 1.3.4.1. Gauss-Markov based mobility model; 1.3.4.2. Markov-History based mobility model; 1.3.4.3. Discussion of prediction-based mobility models; 1.3.5. Software-tools-based mobility models; 1.3.5.1. SUMO framework; 1.3.5.2. VanetMobiSim framework; 1.3.5.3. MOVE framework; 1.3.5.4. Discussion of software-tools-based mobility models; 1.4. VANET challenges and issues; 1.4.1. VANET routing
1.4.2. Vehicular network scalability1.4.3. Computational complexity in VANET networking; 1.4.4. Routing robustness and self-organization in vehicular networks; 1.4.5. Vehicular network security; 1.5. Bibliography; 2: Routing for Vehicular Ad Hoc Networks; 2.1. Basic concepts; 2.1.1. Single-hop versus multi-hop beaconing in VANETs; 2.1.1.1. Single-hop beaconing; 2.1.1.2. Multi-hop beaconing; 2.1.2. Routing classification of VANETs; 2.1.2.1. Topology-based routing; 2.1.2.1.1. Proactive routing; 2.1.2.1.2. Reactive routing; 2.1.2.1.3. Hybrid routing; 2.1.2.2. Geography-based routing
2.1.2.3. Cluster-based routing2.2. Quality-of-service of VANET routing; 2.2.1. Quality-of-service definition; 2.2.2. Quality-of-service criteria; 2.2.2.1. Average end-to-end delay (measured in milliseconds); 2.2.2.2. Average jitter (measured in milliseconds); 2.2.2.3. Average available bandwidth (measured in KB/s); 2.2.2.4. Packet delivery ratio; 2.2.2.5. Normalized overhead load; 2.3. VANET routing standards; 2.3.1. Dedicated short range communication; 2.3.2. Standards for wireless access in vehicular environments (WAVE); 2.3.3. VANET standards related to routing layers
2.3.3.1. Controller area network (ISO 11898)
Record Nr. UNINA-9910815998803321
Bitam Salim  
London, England : , : Wiley, , [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, privacy and reliability in computer communications and networks / / editors, Kewei Sha, Aaron Striegel, Min Song
Security, privacy and reliability in computer communications and networks / / editors, Kewei Sha, Aaron Striegel, Min Song
Pubbl/distr/stampa Alsbjergvej, Gistrup, Denmark ; ; Delft, The Netherlands : , : River Publishers, , 2017
Descrizione fisica 1 online resource (446 pages) : illustrations (some color), tables
Disciplina 004.6
Collana River Publishers Series in Communications
Soggetto topico Routing protocols (Computer network protocols)
Soggetto genere / forma Electronic books.
ISBN 87-93379-90-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910466358903321
Alsbjergvej, Gistrup, Denmark ; ; Delft, The Netherlands : , : River Publishers, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A study of black hole attack solutions : on AODV routing protocol in MANET / / Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, University of Malaya, Kuala Lumpur, Malaysia ; Matthew Neely, technical editor
A study of black hole attack solutions : on AODV routing protocol in MANET / / Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, University of Malaya, Kuala Lumpur, Malaysia ; Matthew Neely, technical editor
Autore Fazeldehkordi Elahe
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA : , : Elsevier, , [2016]
Descrizione fisica 1 online resource (124 p.)
Collana Syngress advanced topics in information security
Soggetto topico Ad hoc networks (Computer networks)
Routing protocols (Computer network protocols)
Computer networks - Security measures
ISBN 0-12-805367-4
0-12-805379-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; A Study of Black Hole Attack Solutions; Copyright Page; Contents; List of Tables; List of Figures; Preface; 1 Introduction; 1.1 Introduction; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Intent of Study; 1.5 Aims; 1.6 Scope; 1.7 The Significance of the Book; 1.8 Organization of the Book; 2 Literature Review; 2.1 Introduction; 2.2 Network; 2.3 Wired Networks; 2.4 Why Wireless Networks?; 2.5 Wireless Networks; 2.5.1 IEEE Standard for Wireless Networks; 2.5.2 Categorization of Wireless Networks; 2.5.2.1 Infrastructure Networks; 2.5.2.2 Infrastructure-Less Networks
2.5.3 Benefits of Wireless Networks2.5.4 Weaknesses of Wireless Networks; 2.6 Ad Hoc Networks; 2.6.1 Static Ad Hoc Networks; 2.6.2 Mobile Ad Hoc Networks (MANETs); 2.6.2.1 Categorization of MANETs; 2.6.2.1.1 Vehicular Ad hoc Networks (VANETs); 2.6.2.1.2 Intelligent Vehicular Ad hoc Networks (InVANETs); 2.6.2.1.3 Internet-Based MANETs (IMANETs); 2.6.2.2 Features of MANET; 2.6.2.3 Utilization of MANET; 2.6.2.4 Benefits of MANET; 2.6.2.5 Weaknesses of MANET; 2.7 Routing; 2.8 Ad Hoc Network Routing Protocols; 2.9 MANETs Routing Protocols; 2.9.1 Categorization of Routing Protocols
2.9.1.1 Table-Driven (Proactive) Routing2.9.1.2 Reactive (On-Demand) Routing; 2.9.1.3 Hybrid Routing; 2.10 Optimized Link State Routing Protocol (OLSR); 2.10.1 OLSR Working; 2.10.1.1 Multipoint Relaying (MPR); 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV); 2.11.1 Routing in AODV; 2.11.1.1 Route Discovery Mechanism in AODV; 2.11.1.2 Route Maintenance Mechanism in AODV; 2.11.2 Features of AODV; 2.11.3 Benefits and Weaknesses of AODV; 2.12 Dynamic Source Routing Protocol (DSR); 2.12.1 Route Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs
2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics
2.18 Summary3 Research Methodology; 3.1 Introduction; 3.2 Research Structure; 3.2.1 Phase 1: Investigating the Existing Solutions; 3.2.2 Phase 2; 3.2.2.1 Phase 2a: Clarifying Efficient Solution; 3.2.2.2 Phase 2b: Executing the Existed Solution; 3.2.2.2.1 Simulation: The Customary Definition; 3.2.2.2.2 Network Simulator (NS); 3.2.2.2.3 Tool Command Language (Tcl) in NS; 3.2.3 Phase 3: Comparing the Effects of Recommended Solution on MANET Performance; 3.3 Summary; 4 Investigation and Selection Procedure; 4.1 Introduction
4.2 Executing a New Routing Protocol in NS to Simulate Black Hole Behavior
Record Nr. UNISA-996426331803316
Fazeldehkordi Elahe  
Waltham, MA : , : Elsevier, , [2016]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui