The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address key management in cluster-based mobile ad hoc networks (MANETs). Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. For this reason, key management is particularly difficult to implement in such networks. We present a fully-distributed ID-based multiple secrets key...
Free-rider problem greatly influences the performance of unstructured networks (like ad-hoc or peer-to-peer networks). To solve such problem, we focus on trust management framework, which is intended to stimulate nodes to cooperate with each other. Currently, the existing trust management framework can be classified into trust establishment framework and reputation-based framework. However, none of...
This paper presents a new approach in the management of mobile ad hoc networks. Our alternative, based on mobile agent technology, allows the designing of mobile centralized servers in ad hoc network, where it is not obvious to think about a centralized management, due to the absence of any administration or fixed infrastructure in these networks. The object of this centralized approach is to provide...
This paper presents a robust key management scheme for supporting the secure communication needs of emergency response operations. The proposed scheme aims to tolerate the dynamic nature of such operations where some system and network components may be damaged or redeployed frequently. mobile ad hoc network (MANET) is widely accepted to be a suitable approach to meet the communication needs of emergency...
A mobile ad hoc network (MANET) is an architecture without fixed infrastructure or centralized administration. However, when a message is transmitted in a multicast group, without any security infrastructure, it may be attacked or corrupted. In this paper we propose a new key management mechanism to support secure group multicast communications in ad hoc networks. The scheme proposes a dynamic construction...
Virtual backbone structures are of fundamental importance in mobile ad hoc networks (MANET) as they are essential to support various applications such as service discovery and provision, multicast, routing, etc. In this paper we consider a very natural approach for the creation of virtual backbones, based on weakly-dominating sets, and investigate its security properties against Byzantine adversaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.