The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
This paper presents a solution to counter black hole attacks in mobile ad hoc networks (MANETs). Black hole attacks are effective DoS (Denial of Service) attacks committed by fabricating routing information, attracting packets routed through them, and then dropping the packets. The ETX (Expected Transmission Count) metric is a common routing metric in MANETs. It measures the delivery ratio of a wireless...
Wireless Mesh Network (WMN) is an emerging technology that has played an important role in the wireless communication scenario. Wireless Mesh Networks are becoming popular as a way of providing Internet access in a cost-effective, easy, and fast manner. However, due to their intrinsic characteristics such as open medium, WMNs are vulnerable to various types of attacks, which aim at disrupting their...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Assurance networks are designed to realize trustable Internet-Of-Things including terminal devices/infrastructure service applications for new generation networks. This paper proposes a unified design model for assurance networks and demonstrates the model, methodology and its application to mobile ad hoc networks. In the unified design model, in order to realize the assurance networks, an overall...
GEOGRAPHIC routing protocols use a basic geographic forwarding strategy to forward packets node by nodes toward the location of the destination. This approach to routing has the advantage of eliminating the need for nodes to maintain conventional routing information. One geographic routing protocol named Boundary State Routing protocol which routes the data using the location of nodes. In this paper...
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
Due to the broadcast nature of wireless transmissions, communications in mobile ad hoc networks (MANETs) are more subject to malicious traffic analysis. In spite of the secure routing protocols, traffic analysis attacks are still not well addressed. Indeed, these protocols focus on security of route maintaining and defending against modification of routing information, which cannot prevent traffic...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
Mobile Ad-Hoc Network (MANET) is an emerging area with practical applications. An Ad-Hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. However, routing security in MANETs appears to be a problem due to open medium, dynamic topology and constrained capability. The proposed work estimates the applicability...
From the perspective of security of Ad Hoc Networks,a lot of researches have been done on the technology of IBE about mobile communications network, the grouping technology of network, and the evaluation of credit of Ad Hoc network, and attempt to propose a security strategy of a novel Ad Hoc network, which reduces the resource expense of Ad Hoc network. The simulation test indicates that this strategy...
MANET (Mobile Ad-hoc Network) has been developed for tactical networks consisting of mobile wireless nodes with various platforms. The secure delivery of mission-critical C2 (Command and Control) messages is one of critical requirements in tactical environments. However, the provision of QoS(Quality of Service) as well as the mission-critical message delivery are still ongoing problem to be solved...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
An ad-hoc network comprises of mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanism and decision-making. The performance of Ad-hoc On Demand Vector (AODV) protocols has been modified...
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.