De et al., 2008 - Google Patents
Epidemic models, algorithms, and protocols in wireless sensor and ad hoc networksDe et al., 2008
View PDF- Document ID
- 380142875857713950
- Author
- De P
- Das S
- Publication year
- Publication venue
- Algorithms and protocols for wireless sensor networks
External Links
Snippet
Sensor networks are composed of a large number of sensing devices, which are equipped with limited computing and radio communication capabilities. They have diverse application areas, ranging from tracking and intrusion detection for security purposes to environment …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Medjek et al. | Multicast DIS attack mitigation in RPL-based IoT-LLNs | |
| KR101821711B1 (en) | Neighbor discovery to support sleepy nodes | |
| Pu et al. | Lightweight Sybil attack detection in IoT based on bloom filter and physical unclonable function | |
| Karlof et al. | Secure routing in wireless sensor networks: Attacks and countermeasures | |
| Banerjee et al. | Self-organizing topology for energy-efficient ad-hoc communication networks of mobile devices | |
| De et al. | Epidemic models, algorithms, and protocols in wireless sensor and ad hoc networks | |
| Anita et al. | Fuzzy‐Based Trust Prediction Model for Routing in WSNs | |
| US11723101B1 (en) | Mobile ad-hoc network data concurrency | |
| Priyadarshini et al. | Invalidation of tunnelling attacks in ubiquitous IoT & wireless sensor enviroment using ML methods | |
| Harras et al. | Controlled flooding in disconnected sparse mobile networks | |
| Briante et al. | Comvivor: an evolutionary communication framework based on survivors’ devices reuse | |
| Le et al. | Turning heterogeneity into an advantage in wireless ad-hoc network routing | |
| Khalladi et al. | A new efficient approach for detecting single and multiple black hole attacks | |
| Busnel et al. | Gcp: Gossip-based code propagation for large-scale mobile wireless sensor networks | |
| Pahuja et al. | Preventive alternate path routing algorithm against intrusion in sensor area network | |
| Sabeena Gnana Selvi et al. | Implementation of reliable post-disaster relief communication network using hybrid secure routing protocol | |
| Hall et al. | DV/DRP: A content-based networking protocol for sensor networks | |
| Rahem et al. | Collaborative trust-based secure routing based ad-hoc routing protocol | |
| FIHRI et al. | The impact of black-hole attack on AODV protocol | |
| Banerjee et al. | UDDN: Unidirectional data dissemination via negotiation | |
| Norman | Optimized routing for sensor networks using wireless broadcast advantage | |
| Marnerides | Working with the gridkit overlay framework the secure-anthocnet overlay | |
| KR20200119123A (en) | Network system and method for sharing route cache information between nodes of the network system | |
| Askar et al. | SEF: A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare. | |
| Al Qurashi | Intrusion detection in IPv6-enabled sensor networks. |