The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
In this paper, we propose a novel intrusion detection (ID) method, distributed court system (DCS), that is applied on OLSR (optimized link state routing) protocol in mobile ad hoc networks (MANETs), to solve link spoofing in topology control (TC) messages. This system performs similar functions as a court in real-life. Network is organized into one-hop clusters, in which each node performs local monitoring,...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
Mitigating misbehavior in mobile ad hoc networks (MANET) requires effective intrusion response systems. In this work, we present an intrusion response scheme that is tailored to support the infrastructure less nature of MANETs. We propose a geographic solution towards excluding misbehaving nodes which is robust against address spoofing from the attacker. In particular, we investigate how an adaptive...
Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult...
Mobile ad hoc network (MANET) consists of a set of wireless devices such as PDAs and notebooks. In MANET there is no centralized administration as well as base station, so the network topology changes frequently. Group communication in MANET is becoming more important day by day because of increasing popularity of MANET as well as constructing subgroups to support ldquomany-to-manyrdquo communication...
Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.