The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
Adhoc wireless networks are defined as the category of wireless networks that utilize multihop radio relaying and are capable of operating without the support of any fixed infrastructure and hence they are also called infrastructureless networks. This type of network allows for spontaneous communication without previous planning between mobile devices. A variety of routing protocols for adhoc wireless...
A mobile ad hoc network (MANET) is a collectionof wireless nodes, which works well only if those mobile nodes aregood and behave cooperatively. The lack of infrastructuresupport and resource constraint is the key issue that causesdishonest and non-co-operative nodes. Therefore, MANET isvulnerable to serious attacks. To reduce the hazards from suchnodes and enhance the security of the network, this...
With the increased numbers of mobile devices working in an ad hoc manner, there are many problems in secure routing protocols. Finding a path between source and destination faces more challenges in Mobile ad hoc network (MANET) environment because of the node movement and frequent topology changes, besides, the dependence on the intermediate nodes to relay packets. Therefore, trust technique is utilised...
Mobile ad-hoc network is dynamic in nature with no centralized organizer. The ad-hoc communication depends on the radio range, node mobility as well as intermediate nodes because communication is performed from one device to another with the help of intermediate nodes, that means each mobile node is treated as a route and hence arises the problem of data security in communication, before that proposal...
Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing...
Transmission of data in infrastructureless mobile ad hoc network (MANET) is performed by cooperation among nodes which requires devising efficient routing schemes. When there is a possibility of non-cooperative and selfish behaviors of nodes in the network, in order to improve the performance, both trust and energy consumption associated with intermediate nodes should be jointly taken into account...
Today Networks are protected using many firewalls and security software's. Several of them are not sufficient and effective. Many intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or their efficiency, but they do not address the security problems. A number of nodes may be selfish meaning that by not forwarding the packets to the target, thereby cutting...
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing in mobile ad hoc networks (MANETs). Most of the existing defense schemes are not effective for the internal attackers that know how the scheme works. In this paper, we propose a neighborhood connectivity based trust scheme that can detect the single and colluded attackers during route...
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the...
Mobile ad hoc network (MANET) is a distinct kind of network where the nodes are connected by way of wireless medium and without any infrastructure. Nodes in the network are fully dependent on other nodes so as to complete the mission successfully. In addition to this, nodes are moving freely and make dynamic topology. Moreover these types of networks can be easily constructed whenever and wherever...
In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks. Nevertheless, they are generally composed of limited resources and may behave in a selfish way. In this paper, we propose a trust model for reactive routing in MANETs. The proposed solution is founded on a mechanism inspired by the CONFIDANT protocol to install and update trust in the network. It fits...
Mobile Ad hoc NETworks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. Routing in MANET is based on mutual support of nodes in the network. But some nodes from the network acts maliciously, so the routing in network collapses. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness...
MANET (Mobile Ad hoc NETwork) is a self organized network with nodes collaborating in order to communicate. Hence, availability of the resources in such network is fundamental. Availability concerns essentially the network nodes as well as routing and forwarding actions accessibility. Generally, nodes lifetime is consumed by legitimate traffic. It also can be shortened or even depleted by deny of...
Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper,...
A Security Association (SA), established by strong authentication, between a node pair in a Mobile Ad hoc Network (MANET) could be lost when its route is disconnected. In contrast, in good channel conditions and stable topology, routing protocols such as the Optimized Link State Routing (OLSR) do not refresh routes periodically, and in doing so, an SA bound to these routes could become stale and out...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.