The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which...
A wireless mesh network (WMN) comprises of mesh access points (MAPs), mesh routers and mesh clients (MCs), where MAPs are almost static and form the back-bone of WMNs. MCs are wireless devices and dynamic in nature, communicating among themselves over possibly multi-hop paths, with or without the help of MAPs. Security has been a primary concern in order to provide protected communication in WMNs...
In wireless ad hoc networks, the route discovery process or the data forwarding process is vulnerable to attackers. In this paper, we address the data forwarding security problem and propose a light-weight secure data forwarding protocol, which utilizes one-way hash chains to achieve the message integrity, where the intermediate nodes can effectively detect the fault link and the source node of the...
Against the problems emerged in protocols presented by N. Modadugu, D.Boneh and M. Kim (2000), new server-aided public key generation protocols on low-power devices are proposed in this paper. The protocols are secure against some passive attacks, such as "collusion attack" and "the third party attack". In addition, efficiency of primality test on low-power devices is improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.