MILITARY AD-HOC NETWORKS

被引:0
|
作者
Stefan, Raluca Mariana [1 ]
Serban, Mariuta [1 ]
机构
[1] Spiru Haret Univ, Bucharest, Romania
关键词
Computer Networks; DTN Architecture; Military Networks; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. The DTN architecture operates as an overlay above the transport layers of the networks, it interconnects and provides key services such as in-network data storage and retransmission, authenticated forwarding and a wide class of service. An example of such network is Military Ad-Hoc Network which may operate in hostile environments where mobility, environmental factors, or intentional jamming may be cause for disconnection. In addition, data traffic on these networks may have to compete for bandwidth with other services at higher priority. Such systems also may have especially strong infrastructure protection requirements.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [1] OLSR routing for military ad-hoc networks
    Plesse, T
    Lecomte, J
    Adjih, C
    Badel, M
    Jacquet, P
    Laouiti, A
    Minet, P
    Muhlethaler, P
    Plakoo, A
    Mobile and Wireless Communications Networks, 2003, : 315 - 318
  • [2] Secure multicast model for ad-hoc military networks
    Choudhary, M
    Sharma, P
    Sanghi, D
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 683 - 688
  • [3] Constructing predictable applications for military ad-hoc wireless networks
    Reeve, David C.
    Davies, Neil J.
    Waldo, Dale F.
    MILCOM 2006, VOLS 1-7, 2006, : 1212 - 1218
  • [4] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    ELECTRONICS, 2021, 10 (04)
  • [5] Ad-hoc networks security
    Raju, G. V. S.
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 209 - 212
  • [6] Localization in ad-hoc networks
    Dana, Arash
    Zadeh, Ahmad Khadem
    Hekmat, Baktash
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 313 - +
  • [7] Ad-hoc filesystem: A novel network Filesystem for ad-hoc wireless networks
    Yasuda, K
    Hagino, T
    NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 177 - 185
  • [8] Overview on Medium Access Control Protocol in Flying Ad-hoc NETworks and Vehicular Ad-hoc NETworks
    Dong Chao
    Tao Ting
    Feng Simeng
    Qu Yuben
    Liu Qingxin
    Wu Yulei
    Zhang Min
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 790 - 802
  • [9] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks
    Hamad, A. M.
    Khedr, W. I.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
  • [10] Vulnerabilities and security for ad-hoc networks
    Mishra, Renu
    Sharma, Sanjeev
    Agrawal, Rajeev
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 192 - 196