Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Abstract-- The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. We propose a distributed topology manag...
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...