The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust...
Securing a Wireless Ad Hoc Network is one of the major concerns for the researchers. Due to wide-ranging characteristics of the ad-hoc networks, it is always at a risk to internal as well as external attacks. Many solutions have been proposed and currently being improved in this area. Most of these solutions involve encryption, secure routing, quality of service etc. Each of them is designed to operate...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
In a mobile ad hoc network (MANET), each node has to rely on others to relay its packets. Since most mobile nodes are typically constrained by power and computing resources, some nodes may choose not to be cooperative by refusing to do so while still using the network to forward their packets. Most previous works focus on data forwarding. However, dropping control packets is a better strategy for...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed via mobile nodes without any prior knowledge of the existing nodes which may not be trustworthy. Trust management appears to be a promising approach...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
Due to resource limitation, it is an optimum solution for intrusion detection in mobile ad-hoc networks (MANETs) that all nodes investigate system and user activities while a subset of network nodes are selected as monitoring nodes to monitor and detect network packets. In this paper, a selection scheme of monitoring nodes called event triggering based adaptive selection (ETBAS) is proposed, which...
In wireless AdHoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routs to other nodes. Therefore, the cooperation of nodes is very important. With presence of selfish or malicious nodes the performance of the network may greatly degrade. In order to enforce the cooperation between the nodes in the system many cooperation schemes have been proposed. This...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
In this research, we propose a robust Sybil attack detection framework for MANETs based on cooperative monitoring of network activities. We do not require designated and honest monitors to perform the Sybil attack detection. Each mobile node in the network observes packets passing through it and periodically exchanges its observations in order to determine the presence of an attack. Malicious nodes...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Mobile ad hoc networks (MANET) is a dynamic wireless self-organizing networks. Owing to MANET take the characteristic of dynamic structure and wireless communication, it is much easy to suffer security threats. Fault-tolerance method allow system failure, it make the system continue to calculate effectively in the inaccurate case. Owing to the autonomy peculiarity of mobile agent, nobody natural entity...
Mobile ad hoc networks (MANETs) are spontaneously formed with a set of wireless nodes without any existing infrastructure or administrative support. The intrinsic characteristics of these networks such as the dynamic topology and the scarcity of resources mainly bandwidth and nodes battery life make network management process a challenging task. In this paper, we present the design and a performance...
In this paper, a new honest-rate base collaborative intrusion detection system (HIDS) has been proposed for mobile, ad-hoc networks. The method uses promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. All nodes join the network with an initial value of 1 for an honesty rate index, termed as h-rate. The h-rate of a node dynamically increases...
In a MANET, nodes provide a cooperative multi-hop forwarding functionality, so no specialized devices are required for routing packets. In such self-organized networks, forwarding packets for other nodes is not in the direct interest of any node, because nodes have to spend battery life, CPU cycles, and use the available network bandwidth to forward packets. So a node may refuse to forward packets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.