The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks have great potential to be employed in various real time fields, such as, military, industry and traffic surveillance, etc. However, due to power and memory limitations of sensor nodes, one of the major challenges about wireless sensor networks is security. Based on evolutionary game theory, the paper proposes an active defense model for wireless sensor networks where nodes...
Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the resource-constrained wireless sensor nodes. Several key pre-distribution schemes have been proposed in literature to establish pairwise key between sensor nodes, but most of which only...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
Voice over Internet Protocol (VoIP) service has been a very popular and important application over the Internet. Recently, wireless mesh networks (WMNs) has been considered as a good solution for VoIP services due to low cost and convenience, easy deployment and larger area coverage. However, many relevant security issues have been raised for integrating IP Telephony into the existent applications...
To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member...
There are some papers on secure or anonymous routing protocol in mobile ad-hoc networks. However, due to their original design goal, most of them are vulnerable to attacks and inefficient. In fact, providing security and anonymity are critical in wireless ad hoc networks. In this paper, we present an efficient secure anonymous routing protocol for clustered mobile ad-hoc networks, which not only solves...
In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data forwarding protocol, which utilizes one-way hash chains to achieve the message integrity, where the intermediate nodes can effectively detect the fault link and the source node of the...
Wireless ad hoc networks , especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is critical securing measure used to mitigate these problems. In this paper, we propose a novel secure anonymous routing scheme for clustered wireless ad hoc networks. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.