The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
Trust management techniques must be adapted to the unique needs of the system architectures and problem domains to which they are applied. Certain characteristics of swarms, such as their lightweight, ephemeral nature and indirect communication, make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in swarm-based autonomic computing systems and find...
Mobile ad hoc networks (MANET) is a dynamic wireless self-organizing networks. Owing to MANET take the characteristic of dynamic structure and wireless communication, it is much easy to suffer security threats. Fault-tolerance method allow system failure, it make the system continue to calculate effectively in the inaccurate case. Owing to the autonomy peculiarity of mobile agent, nobody natural entity...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.