A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks the easiest solution for their interconnection. This has led to the rapid growth of several wireless systems like wireless...
| Main Authors: | Pathan, Al-Sakib Khan, Islam, Humayun Kadir, Sayeed, Sabit Anjum, Ahmed, Farruk, Hong, Choong Seon |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/628/ http://irep.iium.edu.my/628/1/Frame_WAHSN_camera_PRINT.pdf |
Similar Items
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Feasibility of PKC in resource-constrained wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
NAMP: Neighbor Aware Multicast Routing Protocol for mobile ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Authentication Mechanism for Ad Hoc Wireless Local Area Network
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Video performance over ad hoc wireless local area network
by: Tan, Chong Eng
Published: (1999)
by: Tan, Chong Eng
Published: (1999)
Smartening the environment using wireless sensor
networks in a developing country
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
WAIN: Wireless Ad Hoc in Infrastructure Network
by: Yogeswari, Muthusamy, et al.
Published: (2008)
by: Yogeswari, Muthusamy, et al.
Published: (2008)
Routing protocols for ad hoc wireless networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
QoS routing in ad-hoc wireless networks
by: Md Enzai, Nur Idawati, et al.
Published: (2011)
by: Md Enzai, Nur Idawati, et al.
Published: (2011)
Wireless mobile ad-hoc sensor networks for very large scale cattle monitoring
by: Radenkovic, Milena, et al.
Published: (2006)
by: Radenkovic, Milena, et al.
Published: (2006)
A key management scheme with encoding and improved security for wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
On the vital areas of intrusion detection systems in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2012)
by: Abduvaliyev, Abror, et al.
Published: (2012)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
An efficient LU decomposition-based key pre-distribution scheme for ensuring security in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Developing an efficient DMCIS with next-generation wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Security management in wireless sensor networks with a public key based scheme
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Analysis and Simulation of Wireless Ad-Hoc Network Routing Protocols
by: Mohamed, Abdul Haimid Bashir
Published: (2004)
by: Mohamed, Abdul Haimid Bashir
Published: (2004)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Service redundancy and cluster-based routing protocols for wireless sensor and mobile ad hoc networks: a survey
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
by: Yagoub, Mudathir F.S., et al.
Published: (2020)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
by: Mansour, Houssem, et al.
Published: (2015)
by: Mansour, Houssem, et al.
Published: (2015)
Similar Items
-
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006) -
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009) -
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007) -
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)