2013
DOI: 10.12928/telkomnika.v11i2.938
|View full text |Cite
|
Sign up to set email alerts
|

Fault-tolerant and QoS based Network Layer for Security Management

Abstract: Abstrak Jaringan sensor nirkabel (Wireless sensor networks) memiliki peranan yang dominan pada berbagai bidang aplikasi, salah satunya di bidang manajemen keamanan yang membutuhkan route yang langsung, cepat dan efisien (hemat energi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Daniel-Ioan proposed a new security risk assessment model for university education network based on simulated attack [12]. Mekki et al introduced the relevant security risks in the educational network of institution of higher learning and discussed the important influence of computer technology in campus network security; at the same time, they explored how to use computer technology in campus network security [13]. Beck proposed a compound attack modeling method based on attack intent [14].…”
Section: Introductionmentioning
confidence: 99%
“…Daniel-Ioan proposed a new security risk assessment model for university education network based on simulated attack [12]. Mekki et al introduced the relevant security risks in the educational network of institution of higher learning and discussed the important influence of computer technology in campus network security; at the same time, they explored how to use computer technology in campus network security [13]. Beck proposed a compound attack modeling method based on attack intent [14].…”
Section: Introductionmentioning
confidence: 99%
“…At the end it reduced delay in VoIP network. In addition, the authors in [3] used node disjoint multipath routing protocol to provide faulttolerance system and high QoS to alert packets caused by unusual and critical events. Moreover, the FELGossiping protocol is also deployed to route the routine data packets, update the neighbors table and detect the failed nodes.…”
Section: Introductionmentioning
confidence: 99%