The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Connected Vehicles (CVs) can be exposed to black hole attacks that deceive legitimate nodes by falsifying an attractive route to a destination node. This occurs when an attacker sends a packet to the source node confirming the existence of a fresh route. In this paper, we propose a Black Hole Detection Protocol (BlackDP) that works on a highway divided into clusters and monitored by Road Side Units...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
Mobile ad hoc networks (MANET) do not have base stations or access points, and due to this nature, the ad hoc networks are susceptible to jamming attack which is the most common attacks. Since many ad hoc networks employed IP-based routing, they should be protected and communication between nodes should be secured. The aim of this study is to investigate the performance of MANET with the application...
Mobile Ad-hoc Network (MANET) is decentralized infrastructure less wireless network with self configuring dynamic nodes. Routing functionality is carried by nodes with the help of routing protocols for effective communication among them. Since routing protocols are major player in network, the intruders target these protocols. One such repudiation attack is Flooding attack. In flooding attack, malicious...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely...
Wireless Sensor Network (WSN) is a collection of sensor nodes capable for sensing instantaneously. WSNs are widely deployed in hostile environment on ad-hoc basis. Routing protocols are used to discover a suitable route among sensor nodes and transfer sensed data from one node to another node. Several routing protocols are developed and configured according to their characteristics. Ad-hoc nature...
Wireless networks have an important role for development and simply use in human society. In order to categorization of applications, MANETs give a unique range for monitoring and surveillance. MANETs is used to deploy into distant areas for sensing and processing desired information. Due to distributed and open nature of MANET, it is vulnerable and occupied for attacked to intercept and despoil network...
Mobile Ad-hoc Network (MANet) is a set of wireless mobile nodes forming flexible networks, thus they do not need infrastructure and central access points. With increase in the use of Mobile Adhoc Networks security became an essential requirement due to its dynamic topology, limited processing capacity, bandwidth limitations, high bit error rate etc. To provide secured communication among mobile nodes,...
Mobile Ad hoc Networks (MANETs) suffer from security attacks and privacy issues, which dramatically impede their applications. In addition, the security measures applied in MANETs (like encryption and key distribution) have a number of negative effects on the network's performance. Cryptographic operations introduce a lot of both CPU and communication overhead. Therefore, routing protocols improvement...
As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
During blackhole attack, a malicious node captures packets and not forwards them in the network and advertises itself as having the shortest path to the node whose packets it wants to intercept. If more than one malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. To avoid single blackhole attack in MANET we considered...
Smart Home Security is designed to provide better security as well as energy efficiency and comfort. The paper presents a proposed smart home security (SHS) based on PIR Motion detector and MQ 9 Gas detection sensor. These sensors are monitored remotely by employing the communication networks. But the communication may be subject to delay, data loss and transmission congestion. The major challenge...
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile...
Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.