The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive Radio Ad Hoc Networks (CRAHNs) are prone to Primary User Emulation Attacks (PUEAs), a particular security issue in which malicious unlicensed users manipulate their cognitive radio parameter values to monopolize the spectrum usage pretending transmissions of Primary Users. Works in the literature propose to detect or mitigate these attacks, however they are based on network architectural...
Harnessing the full power of the paradigm-shifting cognitive radio ad hoc networks (CRAHNs) hinges on solving the problem of time synchronization between the radios during the different stages of the cognitive radio cycle. The dynamic network topology, the temporal and spatial variations in spectrum availability, and the distributed multi-hop architecture of CRAHNs mandate novel solutions to achieve...
An important characteristic in trust management frameworks is how nodes obtain information about the trustworthiness of other nodes. Some trust management models are based on local information, while others use both information of neighbors and remote nodes. Despite the wide of information used, the existing trust monitoring approaches are mainly based either on passive monitoring mechanisms or on...
Network services in MANETs, such as resource location and distribution of connectivity information, deal with node mobility and resource constraints to support applications. The reliability and availability of these services can be assured by data management approaches, as replication techniques using quorum systems. However, these systems are vulnerable to selfish and malicious nodes, that intentionally...
Operational services in MANETs, such as resource location and distribution of connectivity information, deal with node mobility and resource constraints to support applications. The reliability and availability of these services can be assured by data management approaches, as replication techniques using quorum systems. However, these systems are vulnerable to selfish and malicious nodes, that intentionally...
In Cognitive Radio Ad Hoc Networks (CRAHNs), malicious Secondary Users can exploit CR (Cognitive Radio) capabilities to perform Primary User Emulation Attacks (PUEA). These attacks pretend the transmission of a Primary User (PU), giving to malicious users the priority of using licensed frequencies over well-behaved unlicensed Secondary Users (SU). Since CRAHNs are envisioned as a solution for the...
This work presents SAMNAR, a survivable architecture for wireless self-organized networks (WSONs). SAMNAR is inspired on the human body immune system and focuses on providing network essential services, as link-layer connectivity, routing and end-to-end communication, even in the presence of attacks or intrusions. It employs a new approach for security management consisting in the coordinated use...
Adaptation mechanisms, such as transmission power control (TPC) techniques, cognitive radio technology and intelligent antenna, have been applied to efficiently manage the use of resources on wireless ad hoc networks. However, these mechanisms open doors for Reduction of Quality (RoQ) attacks. Those attacks damage network services exploiting adaptation capability and they can be easily launched on...
Key management is an essential service for wireless ad hoc networks. It supports the secure operation of other network services like routing, end-to-end communication, and connectivity that rely on cryptography primitives to create security solutions. Designing key management systems for WANETs is a demanding task due to the self-organization of the network and the lack of a central entity controlling...
Reliable storage supports different data sharing services, such as mobility and cryptographic key management and distributed naming. Mobile Ad hoc NETworks (MANETs) present issues in guaranteeing the consistency of data on concurrent read and write due to dynamism of nodes, the inexistence of a central control entity and support infrastructure. Probabilistic quorum systems, as PAN (Probabilistic Ad...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.