The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
A group of mobile nodes with limited capabilities sparsed in different clusters forms the backbone of Mobile Ad-Hoc Networks (MANET). In such situations, the requirements (mobility, performance, security, trust and timing constraints) vary with change in context, time, and geographic location of deployment. This leads to various performance and security challenges which necessitates a trade-off between...
Mobility is a major problem in urban centers and vehicular networks have been a focus of study in the attempt to create applications focused on intelligent transport systems (ITS). With that in mind, ITS initiatives act as a possible solution to improve the functioning and performance of traffic systems, reducing congestion and increasing security for citizens. In this way, the present work presents...
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users [1]. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In natural disaster situations, Internet and cellular communication...
A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with each other through electromagneticradio waves. Mobile Ad hoc Network (MANET) consists of mobile nodes, the network is infrastructureless. It dynamically self-organizes in arbitrary and temporary network topologies. Security is extremely vital for MANET. Attacks pave way for security. Among all the potential attacks...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover...
Mobile opportunistic networks allow nodes to freely join and leave the network; hence they are highly susceptible to security threats. The paper proposes a method for detection and avoidance of a non-simultaneous Sybil attack in mobile opportunistic networks. In this attack, a malicious node assumes multiple, fake identities (i.e. Sybils) over a period of time to remain active in the network even...
Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic...
Originally envisioned to tackle the massive content distribution in today's Internet, the Information-Centric Networking (ICN) has turned out to be a promising paradigm for different network scenarios, including Vehicular Ad Hoc Networks (VANETs). Data retrieval independent from specific recipients bound to fixed physical locations could be a key enabler for future vehicular networks, fixing old unsolved...
In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of permissions. Based on the number of attempts...
Due to their rapid evolution, mobile devices demand for more dynamic and flexible networking services. A major challenges of future mobile networks is the increased mobile traffic. With the recent upcoming technologies of network programmability like Software-Defined Network (SDN), it may be integrated to create a new communication platform for Internet of Things (IoT). In this work, we present how...
In security context, mobile ad-hoc network is more vulnerable compare to conventional networks because of open environment and lack of physical tight proximity. Therefore attackers get opportunity to commit crime using these vulnerable points. Several types of attacks committed by attackers to impact network functioning and performance. Attacks committed by intruders that are part of network and compromised...
Mobile Ad hoc Networks (MANETs) are attractive and more popular these days. The bundle of messages or data sent in dynamic network is called Delay Tolerant Network (DTN). The reason of popularity of this kind of network is its easy establishment at any place. The mobile nodes independently work as intermediate node as well as sender and receiver. The connection establishment and data sending is possible...
The Mobile Ad-hoc Networks (MANET) are suffering from network partitioning when there is group mobility and thus cannot efficiently provide connectivity to all nodes in the network. Autonomous Mobile Mesh Network (AMMNET) is a new class of MANET which will overcome the weakness of MANET, especially from network partitioning. However, AMMNET is vulnerable to routing attacks such as Blackhole attack...
Networks are being used in various areas and the mobile ad-hoc network (MANET) is the network in Laptops, smart phones. MANET is a dynamic network without the fixed infrastructure due to their wireless nature and topology and changes due to their dynamic nature. In MANET various routing protocols are used, AODV routing protocol is one of them and the AODV has the different characteristics, AODV is...
Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major...
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile...
Wireless Sensor Networks (WSN) is an evolving technology and a sizzling research topic among researchers due to their tractability and impartiality of network infrastructures, such as base stations. It can also be used for applications such as building, traffic surveillance, and habitat monitoring and many scenarios. It is flexible to go through physical partition and it avoids lot of wiring. The...
A Mobile Ad-hoc Network (MANET) is a constantly self-configuring, infrastructure-less network of mobile devices where each device is wireless, moves without restraint and be a router to put across traffic unassociated to its own use. Every device must be prepared to constantly sustain the information obligatory for routing the traffic. And this is the main challenge in building a MANET. Such networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.