The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad hoc networks (MANETs) play a significant role for communication whenever infrastructure is not available. In MANET, the group communication-based applications use the multicast routing protocol, where there is a single sender node and a group of receiver nodes. The benefits of multicast routing protocols are the capability to reduce the communication costs and saving the network resources...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
Router discovery in IPv6 is vulnerable to rogue Router Advertisements (RAs), wherein unintended and possibly incorrect RAs make their way into the network. An IPv6 host obtains several important information from an RA like the default router's address and the prefix for autoconfiguring its IPv6 address. Incorrect data in the RA fields result in operational problems in the network. This can occur as...
Named Data Networking is a network layer protocol that aims to replace the IP layer in its current internet architecture. NDN comes under the Information Centric Networking. The main difference between NDN and the current IP based internet architecture is the absence of IP addresses in the former. NDN uses interest packets and data packets for communication between computers. Though these two networking...
Intended for providing the security in the VANETS (Vehicular Ad hoc Network) scenario, the covert storage channel has been implemented through which data transmitted between the sender and the receiver. Covert channels are the logical link which be used for the communication purpose and hide the secure data from the intruders. This paper refers to the Establishment of bit selective mode covert storage...
The Internet consists of a large number of interconnected heterogeneous ASs (Autonomous Systems), each owned and administered by an autonomous organization. Traffic in each AS is forwarded by routers that maintain a coherent picture of the network topology using an intra-AS routing protocol. The most popular intra-AS routing protocols are link-state protocols, such as OSPF and IS-IS. An attacker who...
Detecting and handling routing loops is a critical issue in the design of anonymous peer-to-peer content sharing networks (apCSNs). A principal requirement of such a scheme is that it should not leak any message forwarding information that can undermine the user anonymity of the resulting apCSN. A number of loop handling schemes have been developed in apCSNs such as Freenet and GNUnet. However, they...
Routing in Mobile ad hoc Sensor Network (MASNet) have become a dynamic research area owing to its impact on various science and engineering applications. A secure multipath algorithm has been presented in this research which facilitates the nodes in MASNet to execute on-demand discovery and forming set of paths. An Enhanced Secure Multipath Routing (ESMR) is formed with an adaptive behaviour on route...
Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them...
Ad-hoc networks are collection of self-organized, autonomous nodes (routers) and capable to communicate directly with neighbors' node through broadcast packet in within transmission range. Ad hoc network has a primary concern to provide protected communication between mobile nodes. In transmission channel, nodes can be a malicious node and compromise or breaches service, which makes security extremely...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Heterogeneous Sensor Networks are more powerful and efficient than homogeneous sensor networks. It has been shown that homogeneous sensor networks perform poorly because of routine limits and scalability. In our research, we consider to use heterogeneous topology to securely route data in a wireless sensor network. The given area of interest is initially partitioned into Voronoi clusters, where low-end...
Optimized Link State Routing is a routing protocol that has been extensively studied for mobile ad-hoc networks. Link spoofing, which disturbs the routing service, is one of the critical security problems related to the OLSR protocol. Existing approaches against link spoofing attack have several drawbacks. In this paper, we propose an LT-OLSR protocol that broadcasts Hello messages to neighbors within...
Security in wireless ad hoc network (WAN) is very important issue. Due to dynamic topology and mobility of nodes, Wireless Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless networks. Nodes of Wireless Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication...
Secure routing is a guarantee for wireless sensor networks working normally. The classical security mechanisms, such as encryption and authentication can only prevent the outside attacks and is helpless to inside attacks. In order to defeat the inside attacks and realize secure and efficient routing in static wireless sensor networks, we make three contributions in this paper. The first is to build...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.