The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
The routing efficiency in Delay Tolerant Networks (DTN) with social characteristics degrades owing to intermittent connection and high latency. Additionally, congestion is another issue because of the limited resources of nodes. To solve these problems, an improved Socially Aware Congestion Control algorithm (SACC) is proposed. In this algorithm, the social features and the congestion level of the...
This paper focuses on studying the performance of TPGF geographic routing algorithm with multi routing metric called McTPGF in random duty-cycled wireless multimedia sensor networks (WMSNs). The multi-metric contains the geographic distance and the time, which is called sleeping-delay in this paper, the forwarding node waits to forward packet to the neighbor node after it wakes up. We recognize the...
In Ad Hoc network, all the network functions count on node cooperation. Forwarding packets of other nodes is a basic example of such cooperation. However, nodes may not be interested in forwarding the requesting packets due to selfish or malicious reasons, which significantly degrades the network performance. Therefore, in respect of node forwarding process, we propose a global punishment-based repeated-game...
By analyzing Binary Exponential Backoff(BEB) algorithm used in IEEE 802.11 standard , an adaptive improved algorithm is proposed to improve the fairness of the channel access for BEB algorithms, It adjusts dynamically the way of increase or decrease of the contention window based on the number of frame which is sent successfully. Using NS2 to analyze the network's fairness of the channel access of...
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this contribution, we briefly survey previous works regarding...
As the absence of a centralized control in mobile ad hoc networks (MANET), the tradition public key infrastructure (PKI) model is not fully applicable in MANET scenarios. In this paper, we have implemented a fully distributed Certificate Authority (CA) which based the Identity-Based Encryption (IBE) combined with distributed secrete sharing algorithm [1], and integrated it with an OLSR MANET. With...
The characteristics of mobile ad hoc network make it face much more security threats than wired network, while the security of routing is the premise of secure application of ad hoc networks. In allusion to the safety weakness of resisting the active attacks from malicious nodes, trust metric is introduced to defend those attacks by loading a trust model on proposed distance-based LAR (DBALR). The...
Cellular networks and ad hoc networks have been widely deployed to provide many different services for mobile users. Due to their complementary properties, integrating networks of cellular networks and ad hoc networks are about to employed in commercial applications. Hence, secure authentication systems are vital to support this architecture. In this study, we propose a secure authentication scheme...
In ad hoc networks, node misbehaviors due to selfish or malicious reasons can significantly degrade the performance of ad hoc networks. Previously, we proposed a trust-based incentive model on a self-policing mechanism to make nodes evaluate the trust of their neighbor locally (Kun and Meng, 2007). That approach can mitigate contamination by direct observation and the use of second-hand information...
The movement of nodes in MANETs results in a change in routes, requiring some mechanism for determining new routes. In this paper, a distance-based location-aided routing (DBLAR) for MANETs had been proposed. By tracing the LI of destination nodes and the change of distance between nodes to adjust route discovery dynamically, the proposed routing algorithm can avoid flooding in the whole networks...
Heterogeneous collaborative networks have been ever-increasingly concerned due to the constant development of wireless networks . However, before employed in commercial applications, the secure charging should be solved; say, the charging systems with the guarantee of security are vital to support this architecture. Meanwhile, nodes' non-cooperation behavior should be under control as well. Hence,...
In traditional methods for accessing Internet in mobile wireless environment, users can access to fixed networks by one hop (without multi-relay) based on broad band access networks. In some special applications, messages from source users can only arrive at destination terminals by multi-relay (multi-hop) among several mobile users because wireless network is infrastructural, which is so called Ad...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.