The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growing popularity of wireless mobile ad hoc networks(MANETs), many security concerns have arisen from MANETs especially the misbehaving nodes pose a major threat. Node misbehaviour in ad hoc network is caused by lack of cooperation and goes under the name node selfishness. A selfish node does not directly intent to damage other nodes with active attacks but it simply does not cooperate in...
Truly ad hoc networks where no prior knowledge of participants to each other creates difficulties in providing encryption key management services to the network members. If the network uses Public Key Infrastructure (PKI) then a Certificate Authority (CA) must be available at all times. Using threshold cryptography for the CA requires several members to act as servers and collaborate to provide these...
Owing to characteristics of open medium, dynamic topology and distribution, the security of Mobile Ad hoc Network (MANET) is more rigorous than that of traditional network. Referring to the I-ADD process of security analysis, the paper analyzed features, insecurity factors and security threats of MANET. Aiming at the security requirements, the design requirements for network security defense of MANET...
To deal with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of mobile ad hoc environment and mobile devices. This paper presents a Secure and Lightweight...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Adhoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network are responsible for management activities. In multihop adhoc environment, it is difficult to maintain paths through intermediate nodes, due to the mobility of nodes, nature of radio transmission etc. In the absence of an authentication mechanism, malicious nodes can easily corrupt route tables,...
The emergence of new mobile and wireless networks offers opportunities to expand traditional Internet applications. At the same time peer-to-peer systems become widely deployed and allow users to obtain and provide resources in a stable, scalable and reliable manner. In this paper we consider the deployment of P2P auctions over ad hoc networks. We propose a communication architecture and a protocol...
In this paper, we introduce an efficient conditional privacy preservation (ECPP) protocol in vehicular ad hoc networks (VANETs) to address the issue on anonymous authentication for safety messages with authority traceability. The proposed protocol is characterized by the generation of on-the-fly short-time anonymous keys between on-board units (OBUs) and roadside units (RSUs), which can provide fast...
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods,...
The following topics are dealt with: wireless sensors; physical layer aspects; mobile location; wireless medium access control; Internet security; wireless networking; wireless security; Internet services; communication protocols; WIMAX; wireless LAN; internetwork handovers; MANET; wireless QoS; digital media and security; industrial communications; monitoring and sensor networks.
Efficient and improved methods of secured route discovery and secured data transmission in Mobile Ad-hoc Networks (MANET) are most recent research issues for ensuring full applicability of deploying MANETs in wide range of applications, including strategic as well as non-strategic. Secured route discovery has been addressed by SRP/SMT, as a generic protocol independent technique for secured route...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.