The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radios (CRs) have been considered for use in mobile ad hoc networks (MANETs). The area of security in Cognitive Radio MANETs (CR-MANETs) has yet to receive much attention. However, some distinct characteristics of CRs introduce new, non-trivial security risks to CR-MANETs. In this paper, we study spectrum sensing data falsification (SSDF) attacks to CR-MANETs, in which intruders send false...
In this paper, we propose a timestamp series approach to defend against Sybil attack in a vehicular ad hoc network (VANET) based on roadside unit support. The proposed approach targets the initial deployment stage of VANET when basic roadside unit (RSU) support infrastructure is available and a small fraction of vehicles have network communication capability. Unlike previously proposed schemes that...
A network intrusion detection (ID) system detects malicious behavior by analyzing network traffic. Malicious behavior may target the disruption of communications, infrastructure services, and applications. A number of ID techniques proposed for dynamic wireless networks (e.g., sensor, ad-hoc and mobile ad-hoc networks) are based on the creation of an overlay hierarchy or other structure to organize...
Mobile networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet protocol (IP) networks has led to the network mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for mobile IP (MIP). The current work is based on the use...
In wireless networks, the limited available bandwidth combined with varying signal propagation conditions make it necessary to pursue optimization across all layers of the protocol stack in order to boost the achievable throughput. One of the optimization strategies that is deemed to be effective is to dynamically adjust the packet size either to better suit the channel conditions or to minimize the...
The problem of anonymous wireless networking is considered when adversaries who monitor the transmissions in the network are also capable of compromising a fraction of nodes to extract network information. For a given level of network performance, as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. The metric of anonymity considered...
Secure operation of mobile ad-hoc networks requires the ability to track the flow of traffic through the network. Knowledge of the path of a packet allows inference of correct operation or potential attacks. In prior work, we have described a number of different techniques for recording such path information and ensuring its correctness through cryptographic techniques. In this paper, we evaluate...
This paper describes an approach to root cause analysis and fault correlation that addresses the problems inherent in wireless military networks. Root cause analysis concerns itself with identifying and correcting problems in a network. The ultimate goal of root cause analysis is to diagnose the cause for network anomalies, towards the ultimate goal of ensuring that adequate communication functionality...
Security in wireless networks is challenging. Security in cognitive radio networks (CRN) is even more challenging. This is because a CRN consists of cognitive radios (CR) which have many more functions and processes to account for, such as sensing, geolocation, spectrum management, access to the policy database etc. Each of these functions and processes need to be assessed for potential vulnerabilities...
Upgradeability and interoperability are main concerns of Software Defined Radio (SDR). But in the case of military applications, security is also a relevant aspect of SDR. The Secure Software Communication Architecture (SSCA) is a standardized solution to secure SDR. This architecture needs a cryptographic processor for security purposes. However, currently available SSCA compliant ASIC-based cryptoprocessors...
In a multicasting environment, group communications is essential. An important issue of providing secure group communications is group key management. The exclusion basis system (EBS) provides a framework for supporting group key management, especially in a large-size network. In EBS, a key server (KS) is used to generate both administration and session keys. In turn, KS uses these keys to distribute...
Wildcard identity-based encryption (IBE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based...
Integrity assessment plays a critical role in the security and regulatory certification of software-defined radio (SDR) and cognitive radio (CR). We propose a novel approach to assess the execution status of SDR and CR by monitoring their dynamic power consumption. The approach relies on extracting distinctive power consumption signatures, or fingerprints, and then using pattern recognition techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.