The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication in wireless network is either central server based or peer-to-peer network based, but in both cases professional experts like network administrators are required to set up and maintain the network. To access services from a server, an internet connection is must, even though the server and client are placed close to each other. These internet plans are very costly. To overcome these...
This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create...
The following topics are dealt with : computer networks; IP networks; optical transmission; ATM networks; WDM system; wireless LAN; high speed Internet; ad hoc networks; wireless sensor networks; heterogeneous networks; bluetooth technology; personal communication system; broadband communication; 3G and 4G networks; multimedia communication; CDMA system; OFDM technology; communication protocol; spread...
Mobile ad hoc networks allow to create very dynamic communication systems, which are independent from any fixed infrastructure. One of the most important issues regarding the management of an ad hoc network is the configuration of the system according to the way users move. Since a centralized control structure does not exist, we need to determine how the IP addresses must be assigned to the nodes...
Highly dynamic ad hoc radio networks are the key technology for future military and crisis management operations but also raise additional challenges for secure communication between networks with higher security levels attached to mobile nodes. We propose an efficient solution to the currently not satisfactorily handled task of providing a mapping between node identifiers in the radio network and...
A wireless mesh network (WMN) comprises of mesh access points (MAPs), mesh routers and mesh clients (MCs), where MAPs are almost static and form the back-bone of WMNs. MCs are wireless devices and dynamic in nature, communicating among themselves over possibly multi-hop paths, with or without the help of MAPs. Security has been a primary concern in order to provide protected communication in WMNs...
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Our protocol manages group keys taking into consideration the frequent network partitions and the absence of infrastructure. The analysis shows that the protocol is energy efficient for high key replacement rates and frequent...
Extensions for OSPF in a mobile ad-hoc environment have been developed by the OSPF IETF working group. These extensions are emerging as effective routing solutions for tactical edge networks. However, these extensions have been designed and implemented for IPv6 routing, namely OSPFv3, so OSPFv3 is not directly applicable to IPv4 networks. Fortunately, the OSPF working group has also proposed an address...
In the near-future, self-organized networking is expected to become an important component in ITS, and in the Internet architecture in general. An essential challenge concerning the integration of this new component is the accomplishment of scalable and efficient mobile ad hoc routing. This paper overviews considerations relative to the design of such MANET protocols inside the framework provided...
Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could be in form of computer virus, spy programs, terrorist messages, etc. Most available techniques proposed covert channels that use the upper layers of the OSI model. In this paper, we discuss a novel covert channel in the data link layer dedicated to wireless local area networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.