The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as...
Security has become a primary concern for providing communication in mobile ad hoc networks(MANET). Compared with a fixed network, a MANET is more vulnerable to attacks such as passive eavesdropping, data tampering and so on, so it is necessary to encrypt transmitted data to ensure its confidentiality. However, in a resource-constrained MANET, the mobile devices have limited capabilities in computation,...
Continuous mobility of nodes makes ad hoc networks vulnerable to be partitioned. Many partition prevention approaches are only based on link availability while ignoring that nodes mostly move in a group pattern in practical environment. Adversaries may decrease network performance through deliberately launching partition, which is seldom considered as a type of attack in conventional intrusion detection...
An Ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure, so they are vulnerable to many attacks and the security of the network can not be ensued. In this paper, we present a novel Intrusion Detection Mechanism based on the Trust Model (IDMTM) for mobile Ad hoc networks. In IDMTM, we...
Ad hoc networks, which do not rely on fixed infrastructure such as base stations, can be deployed rapidly and inexpensively in situations with geographical or time constraints. However, the nature of ad hoc networks makes them vulnerable to attacks, especially in routing protocols. In order to establish a secure route composed only by trusted nodes and prevent routes from being tampered by internal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.