The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
Many efforts have been done towards secure MANETs, but the conventional lines of defense are still inefficient to put all attacks off. This article examines survivable approaches whose goal is to enable networks to fulfill correctly their critical functions even in the presence of attacks or intrusions. We introduce the most relevant survivable MANET initiatives where either preventive or reactive...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then, its security was analyzed from the angle of technical realization and formal analysis to verify whether the original...
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms...
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID- based threshold signature scheme, which has three attractive properties: (1) The user's co-signing key and signature share are all verifiable,...
With the development of wireless mobile networks, more security issues, such as identity spoof, DoS attack, ARP attack, have been exposed out recently. Meanwhile, mobile nodes require higher performance of handover. However, existing solutions cannot solve the problems flexibly and effectively. In this paper, we present an identity based secure and fast authentication protocol (IBSFAP) for mobile...
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to cryptographically generate the mobile node's home address and the associated private key to sign the mobile node's authentication requests. In addition, the proposed protocol performs reachability...
In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity...
Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard and it opens new horizons for security researchers. In this paper, authorization protocol for both versions of PKM in WiMAX has been analyzed. Possible attacks are also considered including interleaving, replay and suppress replay attack and a methodology is presented to...
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. Security is one of the main issues for mobile ad hoc networks (MANETs) deployment. We introduce a weak to strong authentication mechanism associated with a multiparty contributory key agreement method, designed for dynamic...
The availability of a communication channel that could be everywhere accessible, possibly via wireless devices is a constant matter for the police force. The well-developed public cellular network infrastructure and widespread mobile device can provide with such features, but the lack of security makes it unsuitable for transmitting confidential data. In this paper, we propose a security framework...
Wireless local area networks (WLAN) promise to be widely deployed in a short time, because they provide wire free connections with ease and with much higher transmission rates than current cellular systems. However, security holes have been identified in the operation of WLANs. The 802.11i protocol has been announced to protect the WLAN application area. However, there are still security issues such...
Mobile IP is used to manage the mobility of the Internet mobile users, and to keep their connectivity while they move from place to place. The security of mobile IP considering can be divided into two aspects, first in registration process, second, when connected parties exchange data with each other. In this article, after a brief study on the existing approaches used for securing mobile IP connections...
A major security vulnerability in the mobile telecommunication network is that wireline signaling messages are cleartext. The latest protocol for wireline signaling message security is mobile application part security (MAPSec), which protects MAP (a signaling message protocol) messages on the link between nodes. MAPSec is a limited solution because it still leaves MAP signaling messages unsecured...
MANETs are highly vulnerable to attacks due to their characteristics such as the lack of infrastructure and wireless communication. Considerable improvements have been made towards providing ad hoc network security and existent solutions apply cryptography, intrusion detection systems or reputation systems. However, these conventional defense lines are inefficient to put all attacks and intrusions...
While a lot of important information is being sent and received on the Internet, the information could be exposed to many threats, and the more the multicast service is various and generalized, the more the service range is widened. When a new member joins in or leaves from the multicast group, the group key, which the existing member used, should be newly updated. The existing method had a problem...
Proxy mobile IPv6 has been proposed to enable a network-based mobility support which does not require a mobile host to be involved in mobility signaling. In the Proxy mobile IPv6 specification, an authentication procedure is required as an initial part of registration for network access. However, the current specification does not provide the authentication procedure explicitly. Thus, in this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.