The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) have their profound applications almost in all possible fields to facilitate automation. All WSNs contain low powered nodes for sensing information about the environmental conditions and incessant reporting to the base station. Security is a very essential and critical criterion for communication. The nodes must be trust worthy and believable for routing sensed information...
The anonymous communication protocol Tor constitutes the most widely deployed technology for providing anonymity for user communication over the Internet. Several frameworks have been proposed that show strong anonymity guarantees, none of these, however, are capable of modeling the class of traffic-related timing attacks against Tor, such as traffic correlation and website fingerprinting. In this...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
In order to configure a network in any organization, the user lays out certain specifications that need to be fulfilled. The prospective user defines the security and routing policies that need to be implemented without getting into any technical details. The objective of this work is to map the policies stated, to a set of technical parameters for a networking environment. In other words, a normal...
This paper describes the need for a unified simulation framework which defines the simulation tools and configuration settings for researchers to perform comparative simulations and test the performance of security tools for the AODV MANET routing protocol. The key objectives of the proposed framework are to provide an unbiased, repeatable simulation environment which collects all important performance...
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
Formal verification and validation techniques such as model checking are not widely used in computer networks. These methods are very useful to identify configuration errors, identify design problems and predict network behaviours under different network conditions. This paper describes the two main components of the formal verification process, formal modelling and the analysis process. For formal...
The Sybil attack is exceedingly detrimental and subtle to routing mechanism in ad-hoc network. In this paper we propose a framework in which the vulnerability to the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out under our extended strand space mode in order to further analyze the validity of the threats from the Sybil attackers...
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can't reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls...
Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. However, its security becomes an issue because in WSNs, there is virtual communication by passing the data through sensor via internet...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand source routing protocols in MANET, and a new routing protocol, called endairA, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of secure route in the model, and the flaw in the proof for...
In P2P systems, it is important to guarantee the efficiency and security of message routing between the source and the destination. Unfortunately, malicious attackers can easily insert a lot of nodes they controlled, and disturb the message routing between honest nodes. In order to counter such attacks, secure routing protocols which ensure successful message routing are needed. Furthermore, it is...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of correct system state in the model, and the flaw in the...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.