Secure Fault Tolerance Mechanism of Wireless Ad-Hoc Networks with Mobile Agents

被引:0
|
作者
Turguner, Cansin [1 ]
机构
[1] Hava Harp Okulu, Bilgisayar Muhendisligi Bolumu, Istanbul, Turkey
关键词
Ad-Hoc network; mobile agent; fault tolerance; secure communication; related works; DISTRIBUTED EVENT SYSTEM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad-Hoc Networks are dynamic and wireless self-organization networks that many mobile nodes connect to each other weakly. To compare with traditional networks, they suffer failures that prevent the system from working properly. Nevertheless, we have to cope with many security issues such as unauthorized attempts, security threats and reliability. Using mobile agents in having low level fault tolerance ad-hoc networks provides fault masking that the users never notice. Mobile agent migration among nodes, choosing an alternative paths autonomous and, having high level fault tolerance provide networks that have low bandwidth and high failure ratio, more reliable. In this paper we declare that mobile agents fault tolerance peculiarity and existing fault tolerance method based on mobile agents. Also in ad-hoc networks that need security precautions behind fault tolerance, we express the new model: Secure Mobil Agent Based Fault Tolerance Model.
引用
收藏
页码:1620 / 1623
页数:4
相关论文
共 50 条
  • [41] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Shimada, Isamu
    Higaki, Hiroaki
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 700 - 705
  • [42] A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
    Javed, Muhammad Saqib
    Abu Bakar, Rana
    IEEE ACCESS, 2024, 12 : 194989 - 195004
  • [43] Secure transmission in wireless ad-hoc networks without CSI at the destination
    He, Hongliang
    Li, Xingmei
    AD HOC NETWORKS, 2024, 152
  • [44] A new reactive secure routing protocol for mobile ad-hoc networks
    Saha, Soma
    Chaki, Rituparna
    Chaki, Nabendu
    SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 103 - +
  • [45] Throughput Maximization for Multipath Secure Transmission in Wireless Ad-Hoc Networks
    Bai, Lin
    Han, Pengfei
    Wang, Jingjing
    Wang, Jiaxing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (11) : 6810 - 6821
  • [46] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Amano, Hinano
    Higaki, Hiroaki
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2020, PART IV, 2020, 12252 : 246 - 260
  • [47] Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks
    Hsueh, Ching-Tsung
    Li, Yu-Wei
    Wen, Chih-Yu
    Ouyang, Yen-Chieh
    SENSORS, 2010, 10 (02) : 1251 - 1278
  • [48] SDRP: secure and dynamic routing protocol for mobile ad-hoc networks
    Ghosh, Uttam
    Datta, Raja
    IET NETWORKS, 2014, 3 (03) : 235 - 243
  • [49] Trust Modeling for Secure Route Discovery in Mobile Ad-hoc Networks
    Wadhwani, Ganesh Kumar
    Khatri, Sunil Kumar
    Muttoo, S. K.
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 391 - 395
  • [50] Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks
    Masdari, Mohammad
    IETE TECHNICAL REVIEW, 2017, 34 (05) : 561 - 571