The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicular ad hoc networks are emerging as an effective technology for providing a wide range of safety applications to by-vehicle passengers. Ensuring secure operation is one of the prerequisites for deploying reliable VANETs. In this article we argue that public key infrastructure is the most viable mechanism for securing VANETs as it can meet most VANET security requirements. However, PKI cannot...
Currently, there are work related to selfish nodes in ad hoc mobile networks. In this paper, questions on the viability, validity, and presence of selfish nodes are raised and discussed. Various definitions and interpretations of the term ??selfishness?? are also presented, along with ways of determining and evaluating selfishness. In this paper, we introduce SCNP - Selfish Check Negotiation Protocol...
In this paper, we highlight the impact of variable Push-To-Talk (PTT) delays on performance of a heterogeneous Land Mobile Radio (LMR) network. We first present the PTT delay values and distributions observed for some commonly used LMR nodes. An analytical model is then developed to estimate the asymmetric throughput problem. The results obtained using this model and simulations show that a LMR node...
A mobile ad hoc network is a network without any infrastructure or service access points. In wireless ad hoc networks, the performance of the media access control (MAC) protocol has significant impact on the overall network performance. In contention-based MAC protocols, nodes' access to the shared channel is not synchronized, and they contend for the channel whenever there are packets in their buffers...
Communicating nodes in a wireless and mobile ad hoc network usually seek the help of other intermediate nodes to get communicate channels. In such an open environment, malicious intermediate nodes can be a threat to the security and/or anonymity of the exchanged data between the mobile nodes. The main purposes of this work are to define more strict requirements on the anonymity and security properties...
According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing...
The security of mobile wireless ad hoc networks is a multifaceted topic which in recent years has been the focus of much interest in the research community. While many security issues in these networks can be addressed by protocol design, wireless nodes have inherent physical vulnerabilities that can be exploited by attackers to cause disruptions in network traffic. The nature of these exposures is...
Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructureless networks is how to manage the cryptographic keys that are needed. The unique characteristics...
Denial of service (DoS) attacks present a serious threat to the entire Internet community, as they are very easy to implement, and yet they have the ability bring any arbitrary networked-computer to their knees by flooding them with useless traffic. Although the current volume of published research works on DoS appears significant, most of these works share two common limitations. The goal of this...
Wireless networks is one of the fastest growing technologies. Here the users only need to have a mobile device with a wireless network adapter that negotiates with an access point or base station. Once authenticated and associated, the user can freely move around within the coverage area of the access point without losing data or network connection. On the negative side, these networks tend to have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.