The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors) is consistent with routing information assimilated by a node (from its neighbors). We investigate a minimal trusted computing base (TCB) for MANET nodes to ensure this requirement. We outline low complexity TCB functions which can be executed inside trustworthy boundaries...
Trust models studied before evaluated trust degree by the previous interactions of entities in ad hoc networks within a protocol. However, this way is not accurate and difficult to decide the trust value. The basic difficulty lies in the fact that trust information is often fuzzy and incomplete in an open network environment. The performance of mobile ad hoc network also is constrained by residual...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
The paper introduces a secure DSR protocol, which is based on the principle of the sequence number increment and the scheme of the end-to-end acknowledgement. The OPNET simulation result shows that the secure routing design can resist the black-hole attack effectively.
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
With the wide deployment of P2P networks, the attacks against them have been attracting more and more attention. However, studies on security problems in P2P network mainly focus on individual attack. We still lack systemic analysis of attacks in P2P network. Understanding the taxonomy and the relationships between attacks will help to build the security mechanism and effectively organize the defense...
For the protection of both routing and data forwarding operations, a network layer security solution has been provided as a solution for various security attacks in ad hoc networks. In this paper, to develop a security framework has been proposed. This security framework involves: detection of malicious nodes by the destination node, isolation of malicious nodes by discarding the path and prevention...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats. One feasible way to minimize threats is to establish the reputation-based global trust model. Previous work about the global trust model is almost based on the assumption that the peer with higher trust value will provide more honest feedbacks, and make the quality of feedback of a peer approximately...
Secure route selection is always a challenge for distributed networks. The paper takes trust value as one of routing metrics for distributed networks to defense some attacks. The paper provides an algorithm to compute trust value and then gives a routing algorithm based on trust value. Trust value's computation takes remembering factor and credibility as main parameters. The final route is secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.