The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cooperation of unmanned platforms needs dynamic networking for the secure group communication. Based on the different security domain of wireless environments, an secure networking protocol with identity protection for cooperation of unmanned platforms are proposed, which consists of a four-party security information exchange protocol for the data transmission between nodes in the dynamic network...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol(HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand source routing protocols in MANET, and a new routing protocol, called endairA, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of secure route in the model, and the flaw in the proof for...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol (HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of correct system state in the model, and the flaw in the...
We consider the problem of group key agreement among n parties communicating over an insecure ad hoc network. Firstly, we analyze the state and the problem of existing group key management schemes, and then present a secure, efficient and contributory group key management scheme, which is based on elliptic curve cryptosystems (ECC). The security of our scheme relies on the hardness of elliptic curve...
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.