The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Due to the broadcast nature of wireless transmissions, communications in mobile ad hoc networks (MANETs) are more subject to malicious traffic analysis. In spite of the secure routing protocols, traffic analysis attacks are still not well addressed. Indeed, these protocols focus on security of route maintaining and defending against modification of routing information, which cannot prevent traffic...
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic...
The core of the Optimized Link State Routing (OLSR) protocol is the selection of Multipoint Relays (MPRs) as a flooding mechanism for distributing control traffic messages. A node in an OLSR network, selects its MPR set such that all two-hop neighbors are reachable through, at least, one MPR. However, if an MPR misbehaves during the execution of the protocol, the connectivity of the network is compromised...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
This paper focuses on the resiliency of wireless sensor network routing protocols against selective forwarding attacks by compromised nodes. To provide for security in such a context cryptographic solutions must be completed by algorithmic solutions considering "beyond cryptography" approaches. Enhancing the routing protocol resiliency to attacks is one approach that merits further investigation...
Tor is currently the most popular low latency anonymizing overlay network for TCP-based applications. However, it is well understood that Tor's path selection algorithm is vulnerable to end-to-end traffic correlation attacks since it chooses Tor routers in proportion to their perceived bandwidth capabilities. Prior work has shown that the fraction of malicious routers and the amount of adversary-controlled...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
Path splicing is a proposed routing architecture for the Internet in which end-hosts could change the path their traffic uses by changing a number of bits in the packet header. Path splicing improves the reliability of the network against link failures since it ensures that physically connected links can be discovered and used. To that end, this paper studies the performance of path splicing in non-adversarial...
Site multi-homing is an important capability in modern military networks. Resilience of a site is greatly enhanced when it has multiple upstream connections to the global information grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site can be important in reducing delays and packet loss over low-bandwidth and/or high-delay uplinks. Current approaches...
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with misbehavior in MANET, an incentive mechanism should be integrated into routing decision-making. In this paper firstly we review existing techniques for secure routing, and then propose to...
Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on...
Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We develop two complementary...
In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless sensor networks. We define a new throughput characteristic function, on the basis of which nodes are enforced to cooperate and form coalitions. This function implies the maximal throughput and the most reliable traffic that...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
Traffic Validation Architecture (TVA) is a capability based network architecture that tries to limit Distributed Denial of Service Attacks (DDoS). It considers only the victimpsilas approval in the capability granting process. We propose an extension to the approach by involving two new parameters, the bottleneck linkpsilas status and message type, in the capability granting mechanism. Both these...
Wormhole attack is one of the most severe threats to ad hoc networks. There have been many researches to overcome the wormhole attack. These researches, however, still have some limitations to handle wormhole attacks properly such as burden of computation, complicated steps before making up a session, and no response method. In this paper, we propose an effective wormhole attack defense method that...
We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the flow of current through an electric circuit and propose a metric for quantifying the vulnerability of the traffic using the circuit mapping. We compute the vulnerability metric as a function of the routing and the cryptographic protocols used to...
There are many routing protocols proposed for Mobile Ad hoc Networks (MANET) [1]. However most of these protocols are analysed by two standard techniques: simulation and security analysis. There has been a lack of work on the analysis and performance of secure routing protocols in real network test- bed. In this paper, a quantitative set of results for the performance comparison between Adaptive On-demand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.