The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In mobile ad hoc networks (MANETs), hierarchical key management structure has some distinct features and becomes popular in many applications. In a MANET where security requirement is high, node states should be considered when constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated from optimally...
Due to their nature, vehicular ad hoc network (VANET) is vulnerable to denial of service (DoS) attacks, such as jamming attack. The objective of a jammer is to interfere with legitimate wireless communications, and to degrade the overall QoS of the network. In this paper, we propose a model to detect a particular class of jamming attack, in which the jammer transmits only when valid radio activity...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping...
We investigate the problem of eavesdropping control in wireless communications networks. When a confidential message is transmitted through a wireless network, there is a potential security breach or 'information leakage' due to the network's susceptibility to eavesdropping. In this work, we quantify the information leakage problem in the context of resource allocation. By limiting the signal to interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.