The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Assurance networks are designed to realize trustable Internet-Of-Things including terminal devices/infrastructure service applications for new generation networks. This paper proposes a unified design model for assurance networks and demonstrates the model, methodology and its application to mobile ad hoc networks. In the unified design model, in order to realize the assurance networks, an overall...
Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Key management is crucial part of security, this issue is even bigger in MANETs. The distribution of encryption keys in an authenticated manner is a difficult task. Because of dynamic nature of MANETs, when...
In this work, we investigate the optimal key generation problem for a threshold security scheme in mobile ad hoc networks. The nodes in these networks are assumed to have limited power and critical security states. We model this problem using a closed discrete-time queuing system with L queues (one per node) randomly connected to K servers (where K nodes need to be contacted to construct a key). In...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than in wired...
A Security Association (SA), established by strong authentication, between a node pair in a Mobile Ad hoc Network (MANET) could be lost when its route is disconnected. In contrast, in good channel conditions and stable topology, routing protocols such as the Optimized Link State Routing (OLSR) do not refresh routes periodically, and in doing so, an SA bound to these routes could become stale and out...
In wireless networks, security has become the prime factor of concern. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANETS), furthermore leads to a situation where it is very difficult to establish secure data transmission. Since the use of mobile equipments such as cellular phones or laptops is tremendously increasing and because of limited physical security, vulnerability...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanisms cannot meet the security requirements of MANET due to the limited communication bandwidth, computation power, memory and battery capacity, and dynamic deployment environment. Many...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Owing to characteristics of open medium, dynamic topology and distribution, the security of Mobile Ad hoc Network (MANET) is more rigorous than that of traditional network. Referring to the I-ADD process of security analysis, the paper analyzed features, insecurity factors and security threats of MANET. Aiming at the security requirements, the design requirements for network security defense of MANET...
In this paper, we address key management in cluster-based mobile ad hoc networks (MANETs). Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. For this reason, key management is particularly difficult to implement in such networks. We present a fully-distributed ID-based multiple secrets key...
In this paper, a security architecture is designed based on the artificial immune system by using multi-agents in mobile ad hoc networks. There are two types of immunity-based agents: one is detection agent and the other is counterattack agent. Detection agents take charge of monitoring the nodes in the network, detecting the anomaly activities, and taking response to the invader, which may be viewed...
The recent proliferation of wireless devices extends the scope of mobile ad hoc networks (MANETs) applications beyond the military domain to include civil and commercial application scenarios. Since MANETs are composed of mobile terminals with limited resources, MANET security remains an unsolved and motivating challenge. Due to advantageous like in-frastructureless and spontaneous deployments, MANETs...
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the...
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called ??Black Hole?? attack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.