Research explorer tool

18 results

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks

Thesis
Migas, N. (2008)
MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000
Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full ...

Mobile IP conditional binding update.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...

On High Performance Multicast Algorithms for Interconnection Networks

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2006)
On High Performance Multicast Algorithms for Interconnection Networks. In M. Gerndt, & D. Kranzlmüller (Eds.), High Performance Computing and Communications; Lecture Notes in Computer Science, 330-339. doi:10.1007/11847366_34
Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should...

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing

Conference Proceeding
Migas, N., & Buchanan, W. J. (2005)
Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. In The 2005 IEEE Congress on Evolutionary Computation. , (147-154). https://doi.org/10.1109/ecbs.2005.51
Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is n...

Migration of mobile agents in ad-hoc wireless networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...

We know where you are [cellular location tracking]

Journal Article
Raja, K., Buchanan, W., & Munoz, J. (2004)
We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307

Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks.

Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2003)
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. In Proceedings. 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2003. , (200-206). https://doi.org/10.1109/ECBS.2003.1194800
Wireless networks and the usage of mobile devices are becoming popular in recent days, especially in creating ad-hoc networks. There is thus scope for developing mobile system...