The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio is the next-generation wireless communication network that improves the efficiency of the radio spectrum through exploitation of underutilized licensed spectrum (or white spaces). This paper applies a reinforcement learning-based Trust and Reputation Management (TRM) scheme to cluster-based routing and shows network performance enhancement, including throughput and rewards. Generally...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
Wireless Mesh Network (WMN) is a new technology that is gaining importance among traditional wireless communication systems. Wireless Mesh Networks are becoming a reasonable choice to offer Internet access in an inexpensive, convenient, and quick way. However, WMNs are vulnerable to several kinds of attacks because of their inherent attributes such as the open communication medium. Malicious mesh...
This paper presents a solution to counter black hole attacks in mobile ad hoc networks (MANETs). Black hole attacks are effective DoS (Denial of Service) attacks committed by fabricating routing information, attracting packets routed through them, and then dropping the packets. The ETX (Expected Transmission Count) metric is a common routing metric in MANETs. It measures the delivery ratio of a wireless...
Consider a one-dimensional wireless network with n nodes uniformly and independently distributed at random in the interval. In addition, m eavesdropper nodes are uniformly and independently distributed in. For a randomly selected source-destination pair, we consider the problem of securely delivering a message from the source to the destination and we present achievable results on the number of eavesdropper...
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual...
Wireless Mesh Network (WMN) is an emerging technology that has played an important role in the wireless communication scenario. Wireless Mesh Networks are becoming popular as a way of providing Internet access in a cost-effective, easy, and fast manner. However, due to their intrinsic characteristics such as open medium, WMNs are vulnerable to various types of attacks, which aim at disrupting their...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Transparent optical networks based on wavelength division multiplexing (WDM) can exploit the huge capacity of optical fibers by dividing it among different wavelengths. Physical-layer attacks, such as high-powered jamming, can seriously degrade network performance and must be dealt with efficiently. Hence route lightpaths in such a way as to minimize the potential damage caused by various physical-layer...
Assurance networks are designed to realize trustable Internet-Of-Things including terminal devices/infrastructure service applications for new generation networks. This paper proposes a unified design model for assurance networks and demonstrates the model, methodology and its application to mobile ad hoc networks. In the unified design model, in order to realize the assurance networks, an overall...
GEOGRAPHIC routing protocols use a basic geographic forwarding strategy to forward packets node by nodes toward the location of the destination. This approach to routing has the advantage of eliminating the need for nodes to maintain conventional routing information. One geographic routing protocol named Boundary State Routing protocol which routes the data using the location of nodes. In this paper...
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides...
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
Wireless sensor networks (WSNs) are applied to various applications, ranging from military to civilian fields. Due to the critical nature of such applications, security issues are of significant importance. WSNs are vulnerable to different types of attacks since they are often deployed in hostile and unprotected environments. In this paper, we present a novel distributed intrusion detection approach,...
Due to the broadcast nature of wireless transmissions, communications in mobile ad hoc networks (MANETs) are more subject to malicious traffic analysis. In spite of the secure routing protocols, traffic analysis attacks are still not well addressed. Indeed, these protocols focus on security of route maintaining and defending against modification of routing information, which cannot prevent traffic...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.