MILITARY AD-HOC NETWORKS

被引:0
|
作者
Stefan, Raluca Mariana [1 ]
Serban, Mariuta [1 ]
机构
[1] Spiru Haret Univ, Bucharest, Romania
关键词
Computer Networks; DTN Architecture; Military Networks; Security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The highly successful architecture and protocols of today's Internet may operate poorly in environments characterized by very long delay paths and frequent network partitions. Often deployed in mobile and extreme environments lacking continuous connectivity, many such networks have their own specialized protocols, and do not utilize IP. The DTN architecture operates as an overlay above the transport layers of the networks, it interconnects and provides key services such as in-network data storage and retransmission, authenticated forwarding and a wide class of service. An example of such network is Military Ad-Hoc Network which may operate in hostile environments where mobility, environmental factors, or intentional jamming may be cause for disconnection. In addition, data traffic on these networks may have to compete for bandwidth with other services at higher priority. Such systems also may have especially strong infrastructure protection requirements.
引用
收藏
页码:357 / 361
页数:5
相关论文
共 50 条
  • [31] Ad-hoc networks of traffic cabinets
    Gheorghiu, Rəzvan Andrei
    Stan, Valentin Alexandru
    Timnea, Radu Şerban
    Dumitrescu, Cətəlin
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2015, 77 77 (1 1): : 115 - 120
  • [32] An Architecture for Social Ad-Hoc Networks
    Al-oqily, Ibrahim
    Al-Shamaileh, Mohmmad
    Oqeili, Saleh
    2013 IEEE JORDAN CONFERENCE ON APPLIED ELECTRICAL ENGINEERING AND COMPUTING TECHNOLOGIES (AEECT), 2013,
  • [33] Performance of Underwater Ad-Hoc Networks
    Stefanov, Andrej
    Stojanovic, Milica
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [34] Routing with anycasting in ad-hoc networks
    Ahmad, R
    Azam, F
    Li, Z
    2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 400 - 405
  • [35] Stochastic routing in ad-hoc networks
    Lott, C
    Teneketzis, D
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2006, 51 (01) : 52 - 70
  • [36] Computing of trust in ad-hoc networks
    Zhu, Huafei
    Bao, Feng
    Liu, Jianwei
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 1 - 11
  • [37] Connectivity in finite ad-hoc networks
    Wang HanXing
    Lu GuiLin
    Jia WeiJia
    Zhao Wei
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (04): : 417 - 424
  • [38] Connectivity in finite ad-hoc networks
    HanXing Wang
    GuiLin Lu
    WeiJia Jia
    Wei Zhao
    Science in China Series F: Information Sciences, 2008, 51
  • [39] Security scheme for ad-hoc networks
    Kalligeros, H
    Hadjiefthymiades, S
    Frantzeskakis, D
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 52 - 61
  • [40] QoS in Mobile Ad-Hoc Networks
    Pushp Sra
    Satish Chand
    Wireless Personal Communications, 2019, 105 : 1599 - 1616