The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
This work presents a new mechanism for securing mobile ad hoc domain. Some human immune features and properties have been motivated in an attempt to build a robust security system. New computational techniques have been developed based on the immune system concepts, seeking to solve several engineering problems; however, not all the previous approaches have a tangible contribution to the networking...
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodespsila information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
Securing wireless networks poses unique research challenges. In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and mobile ad hoc networks. We identify the security threats as well as examine the current solutions. We further summarize lessons learned, discuss...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.