The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad-hoc networks are more vulnerable to security attacks due to their unique characteristics such as dynamic topology, no fixed infrastructure, resource limitations and multi-hop scenario. In MANETs one the dangerous attack is packet dropping attack. This packet dropping attack is two types: 1. Black hole and 2. Gray hole. In both the attacks, an attacker sends the false reply to source node...
In a public network, it is unlikely for a node which has limited resources to collaborate without gain. For avoidance of the fact that nodes refuse to cooperate in MANET, several schemes classified as reputation-based and credit-based, are considered suitable for ad-hoc networks, whereas many of these schemes are based on proactive or reactive routing protocols but none of them is based on a hybrid...
This paper describes the main features of an advanced communication model aimed to enhance the protection of critical energy assets against man-made attacks (terrorism) or natural disasters. The proposed model is based on a hybrid network architecture, which combines the advantages of different wireless technologies, such as Delay/Disruption Tolerant Networking, Mobile Ad-hoc Networks, and Wireless...
In a mobile ad hoc network (MANET), each node has to rely on others to relay its packets. Since most mobile nodes are typically constrained by power and computing resources, some nodes may choose not to be cooperative by refusing to do so while still using the network to forward their packets. Most previous works focus on data forwarding. However, dropping control packets is a better strategy for...
The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved...
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed via mobile nodes without any prior knowledge of the existing nodes which may not be trustworthy. Trust management appears to be a promising approach...
The absence of a router or a base station urges the need for a better access control mechanism in the ad-hoc networks. All the nodes in the network need to cooperate among themselves for proper functioning of the network. It is important to provide access only to the nodes, which cooperate in routing and forwarding, and to deny access to the selfish nodes. Selfish nodes send and receive their own...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
In wireless AdHoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routs to other nodes. Therefore, the cooperation of nodes is very important. With presence of selfish or malicious nodes the performance of the network may greatly degrade. In order to enforce the cooperation between the nodes in the system many cooperation schemes have been proposed. This...
Wireless sensor networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Many solutions have been proposed to enforce the collaboration of nodes in MANETs. Most of them rely on monitoring mechanisms to detect selfish or malicious behaviors. These mechanisms have in common the implicit use of MAC layer information in their detection process. This paper...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
In this paper, a new honest-rate base collaborative intrusion detection system (HIDS) has been proposed for mobile, ad-hoc networks. The method uses promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values. All nodes join the network with an initial value of 1 for an honesty rate index, termed as h-rate. The h-rate of a node dynamically increases...
In this paper, we present a methodology and a toolkit to conduct tightly controlled real-world experiments in wireless multihop networks. The main features of our EXC toolkit are a plug-in architecture for easy integration of new functionality, simple scheduling of experiment runs, direct monitoring of experiments, easy management of node mobility, and high portability. EXC does not require specific...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
In a MANET, nodes provide a cooperative multi-hop forwarding functionality, so no specialized devices are required for routing packets. In such self-organized networks, forwarding packets for other nodes is not in the direct interest of any node, because nodes have to spend battery life, CPU cycles, and use the available network bandwidth to forward packets. So a node may refuse to forward packets...
This paper presents a survey of current methods of detecting black hole attack against ad hoc on-demand distance vector routing protocol in mobile ad hoc networks. In a black hole attack, a malicious node answers each route request with a fake reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. Seven detection...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.