![]() Trusted certification, using resources testing, and using social networks. The attack by resources testing, which can by in the form of IP testing, The second vein of literature considers defending against Theįirst vein of literature considers defending against the attack using trustedĬertification, which is done by either centralized certification or distributedĬertification using cryptographic primitives that can replace the centralizedĬertification entity. Social networks used as bootstrapping security and tools from random walk The third and last vein of literature is by mitigating the attack combining Network coordinates, recurring cost as by requiring clients to solve puzzles. Three veins of literature show several shortcomings which form several Our survey and analyses of the different schemes in the Theory that have shown to be effective in defending against the attack underĬertain assumptions. ![]() Interesting directions and research questions worthy of investigation. Next generation network characteristics increase the complexity in the design and provision of advanced services, making inappropriate the selection of traditional approaches. Future networks are becoming larger in scale, more dynamic and more heterogeneous. In order to cope with these requirements, services are expected to adapt to environmental conditions and require minimum human intervention. In this paper a new model for providing autonomous and decentralized services is proposed, especially focusing on mobile ad hoc networks (MANETs). Using a newly proposed four-layered approach, service development may be realized independently from the underlying physical network. In a reference implementation, it is demonstrated that it is possible to set up an overlay network that hides any network changes from the service layer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |