The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to limitations of power, computation capability and storage resources, wireless sensor networks are vulnerable to many attacks. The paper proposed a novel routing protocol algorithm for Wireless sensor network. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to distance of nodes to the base station, density of nodes distribution and residual...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Lifetime optimization and security are two important design issues for multi-hop wireless sensor networks with non-replenishable energy resources. In this research, we propose a novel secure and energy aware (SEAR) routing protocol to address these two issues concurrently through balanced energy consumption and probabilistic random walking. SEAR is designed with two configurable parameters, energy...
Internet routers must adhere to many polices governing the selection of paths that meet potentially complex constraints on length, security, symmetry and organizational preferences. Many routing problems are caused by their misconfiguration, usually due to a combination of human errors and the lack of a high-level formal language for specifying routing policies that can be used to generate router...
In this paper we are proposing an efficient secure solution to the data centric routing protocol One Phase Pull diffusion which permit multi-hop routing of sensed data. SecOPP provides both Group and Pairwise key distribution with the possibility of rekeying as well as security services: integrity, authentication and confidentiality of exchanged messages. All these are obtained without using a key...
Wireless sensor networks are often deployed in harsh environments, where the adversary is able to capture certain sensors. Once a sensor is compromised, the adversary can easily replicate it and deploy several replicas back into the network for further malicious activities. Although a number of protocols have been proposed to tackle such node replication attacks, few of these schemes are suitable...
An ad hoc network is a collection of computers (nodes)that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use demanding applications such as Voice over IP, videoconferencing, and streaming media when they are connected through an ad hoc network. Because over provisioning, a common technique in wired networks, is often impractical in...
In 2006, Du, Xiao, Chen, and Wu proposed a routing protocol for sensor networks using cell relay. They claimed their protocol was secure since they used pairwise key establishment. However, an adversary can implement attacks without keys or with only one newly deployed compromised node. Therefore, in this paper, we point out the vulnerabilities of this protocol and propose an improved protocol.
In current research self-security management is of high interest. Wireless Ad hoc networks use mobile nodes to enable communication outside wireless communication zone. Attacks on wireless ad hoc network routing protocols disrupt network performance and reliability. In active black hole attacks on wireless networks; malicious nodes advertise the shortest path through the, between source and destination,...
The importance of emergency services has lead to an indispensable need for lightweight technologies that will support emergency rescue missions. Due to their nature and the non-infrastructure characteristics Mobile Ad-hoc Networks (MANETs) are characterised as autonomous networks that have the potential to be exploited when wireless communications should be established in an ad-hoc manner in cases...
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. Due to this nature of MANET, it is possible that there could be some malicious and selfish nodes that...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
In mobile ad hoc networks, routing security has become an important issue. Due to limited bandwidth and batteries energy of ad hoc networks, routing protocols of ad hoc must be secure, effective and less redundancy. This makes it possible for analyzing the security performance of routing protocols via formal analysis. In this paper, we describe the formalization of routing protocols by using BAN logic,...
The performance and security of ad hoc networks rely on the self-organized, collaborative and the trusted between the distributed links. To route and forward the data, it is important to evaluate the individual behavior of each node in network, benevolent nodes can keep the network working smoothly. However, malicious nodes present in the network that try to disrupt, distort or disturb the network...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand source routing protocols in MANET, and a new routing protocol, called endairA, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of secure route in the model, and the flaw in the proof for...
Mitigating misbehavior in mobile ad hoc networks (MANET) requires effective intrusion response systems. In this work, we present an intrusion response scheme that is tailored to support the infrastructure less nature of MANETs. We propose a geographic solution towards excluding misbehaving nodes which is robust against address spoofing from the attacker. In particular, we investigate how an adaptive...
Wireless sensor networks are widely used both in the civil and military fields. Large-scale sensor nodes are usually deployed in potentially adverse or even hostile environment, so the security in these networks is very important. The design for key management protocol is one of the most important aspects and basic research field of secure wireless sensor networks. The key management in wireless sensor...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
An evolution of a hardware technology makes it possible to deploy lightweight and multi-functional mobile devices in a real environment. Wireless sensor networks (WSN) are representative networks using these tiny and low-power sensor devices. Two types of communications occur in sensor networks: one is between end nodes, and the other is between end node and base station (BS). Since not only the resource-restriction...
Due to the fact that the wireless links in an ad hoc network are susceptible to attacks and the nodal mobility renders the network to have a highly dynamic topology, it becomes critical to detect major attacks against the routing protocols of such networks and also provide some extent of QoS to the network traffic. In this paper, we present a new secure routing protocol (SRP) with quality of service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.