The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network nodes (i.e., adding security messages to protocols) or by internal...
For the mobile ad hoc networks (MANET) security is a vital element. For providing security against malicious nodes all the researchers are striving specially and particularly on all the security challenges in the MANETs. Within these wirelessnetworks some special techniques have been propounded for secure routing protocols. Our propounded work presents a more effective outcome to mitigate black hole...
A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with each other through electromagneticradio waves. Mobile Ad hoc Network (MANET) consists of mobile nodes, the network is infrastructureless. It dynamically self-organizes in arbitrary and temporary network topologies. Security is extremely vital for MANET. Attacks pave way for security. Among all the potential attacks...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
Energy saving is the main concern in mobile ad hoc network to improve network lifetime. To design a secure geographic routing protocol with data compression, boundaries of mobile ad hoc nodes have been considered. AODV is the basis for SMHSP (Secured multi hop strong path protocol) protocol. AODV refers to Ad hoc on demand distance vector, a routing protocol designed for wireless and mobile ad hoc...
Security is an essential requirement in mobile ad hoc network (MANETs). In this paper, we proposed the survey of countermeasures of all security attacks of network layer in MANETs. To the best of our knowledge, this is the first paper that explaining all the existing countermeasures of network layer attacks in MANETs. The countermeasures are features or functions that reduce or eliminate security...
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. There may be several reasons for packet losses, such as interference, queue overflow, and node mobility. Identifying the real underlying cause of a packet loss event is important for any security solution. To detect truly malicious nodes, it is necessary...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic...
Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing...
Communication is no longer restricted to areas with telecommunication network infrastructure due to the introduction of wireless mobile Ad-hoc Network (MANET) that makes it possible to communicate anytime anywhere, without the support of a pre-existing network infrastructure. Unfortunately, MANET comes with unique features which are neither common to the conventional wired networks nor the cellular...
Mobile Ad-hoc Network (MANET) is decentralized infrastructure less wireless network with self configuring dynamic nodes. Routing functionality is carried by nodes with the help of routing protocols for effective communication among them. Since routing protocols are major player in network, the intruders target these protocols. One such repudiation attack is Flooding attack. In flooding attack, malicious...
The Mobile Ad-hoc Network (MANET) is a collection of mobile nodes. These nodes can setup and configured automatically without involvement of user. In MANET each node can move independently. Routing is the main issue because the topology in the MANET changed very fast. Due to power constraint the transmission process is multi hop in nature. Various security attacks can affect the throughput, end-to-end...
Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication...
A Mobile ad Hoc Network is a collection of nodes which is an infrastructure less network and hence can be easily established and deployed instantly. In addition to their normal operation, all the nodes in this kind of network act as routers as well. Because of the mobility and dynamic nature of the network, all the nodes are free to move randomly and hence topology of a MANET changes very frequently...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
In recent years, mobile ad hoc networks have become a main focus in the industry. A mobile ad hoc network is open and dynamic in nature, inviting the major scope for false activities, malicious attacks and other acts, so its trust and security issues have emerged. Our ultimate aim is to improve the security of files shared across a mobile ad hoc network with reduced file searching cost and delay,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.