Mobile Ad Hoc Networks Authentication Using NPV Method

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Geographic routing in spur-of-the-moment networks data gathering in sensor networks, movement coordination among autonomous robotic nodes, location-specific services for handheld devices and danger warning or traffic monitoring in vehicular networks are all examples of services that construct on the accessibility of neighbor position information. NPV (Neighbor Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Such a situation is of particular interest since it leaves the door open for adversarial nodes to misuse or disturb the location-based services.
Download Now

Find By Topic