Learn More
In this paper, we have proposed a security schema for Ad-hoc On-Demand Distance Vector (AODV) routing protocol. In this schema, each node in a network has a list of its neighbor nodes including a shared secret key which is obtained by executing a key agreement when joining a network. One key principle in our schema is that before executing route discovery(More)
—Recently, a new routing algorithm called inside-out routing algorithm was proposed for routing an arbitrary permutation in the omega-based 2log 2 N stage networks. This paper discusses the problems of the inside-out routing algorithm and shows that the suggested condition for proper routing in the omega-omega network is insufficient. An extended necessary(More)
In the recent years, there is a strong interest of using switched Ethernet in factory automation. The switched Ethernet offers many attractive features such as large throughput, traffic isolation and full-duplex links. However, although using full-duplex switched Ethernet can limit the collisions to each port, the real-time features may be affected due to(More)