The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless communication faces several security risks. An attacker can easily inject bogus packets, impersonating another sender. We refer to this attack as a spoofing attack. An attacker can also easily eavesdrop on communication record packets, and replay the (potentially altered) packets. In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing...
In previous work, we proposed a ??Bootstrap?? protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of this Bootstrap protocol, striving to answer the following questions: 1) To what extent can an adversary undermine the correctness and performance of the...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
A fair non-repudiation security protocol can provide non-repudiation proof for two parts of the exchange at the same time, or both get nothing. But many protocols performed weak in logical analysis. In this paper, a group of new protocols(with 3 sub-protocols) with off-line The Third Party(TTP) are presented. We analysis them with a new Kailar logic analytical method. Finally, the proposed protocols...
Key management is an important cryptographic primitive upon which other security services are built. Most of the existent pairwise key management protocols consider homogenous ad hoc sensor networks. However, recent researches have demonstrated the limitation of this architecture in terms of performance and scalability. Therefore, this paper focuses on proposing a pairwise key management protocol...
Ad-hoc network management differs from that carried out in networks with infrastructure in that a central node is not used to undertake tasks. Spontaneous networks may be the solution to the configuration problems posed. Here we present a distribution model to resolve these questions.
In ad-hoc networks, mobile nodes cannot be supported the group authentication by Internet infrastructure. To resolve the group authentication in ad-hoc networks, several protocols for group key agreement have been proposed. These protocols assumes the reliable communication links between MNs. However, wireless links in ad-hoc network are inherently unreliable. We propose a group key agreement algorithm...
Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult...
Mobile ad hoc network (MANET) consists of a set of wireless devices such as PDAs and notebooks. In MANET there is no centralized administration as well as base station, so the network topology changes frequently. Group communication in MANET is becoming more important day by day because of increasing popularity of MANET as well as constructing subgroups to support ldquomany-to-manyrdquo communication...
Ad-hoc networks offer communication over a shared wireless channel without any pre-existing infrastructure. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent...
Wireless sensor networks have been identified as being useful in a variety of domains to include military sensing and tracking, environment monitoring, patient monitoring and tracking smart environment, etc. When sensor networks are deployed in a hostile environment, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the resource, limitations of...
We formalize a model for node capture attacks in which an adversary collects information about the network via eavesdropping on the wireless medium and captures nodes based on the learned information. We show that attacks in this adversary model correspond to NP-hard optimization problems and discuss the behavior of a reasonable heuristic algorithm. We show that the goals of node capture attacks can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.