The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Within wireless networks, an unauthorized or malicious wireless device can receive broadcasted messages or broadcast its own messages at any time provided it is within signal range of other wireless network nodes. Wireless networks have a higher rate of bit errors (BER) when compared to wired networks. The frequency of attacks on networks has grown in parallel with development of wireless networking...
Trust is a soft security solution for Ad-hoc Wireless Networks such as Mobile Adhoc Networks (MANETs), Wireless Sensor networks (WSNs). Due to openness of the networks a malicious node can easily join and disrupt the network. Trust models are used to discriminate between legitimate and malicious nodes in the network. The characteristics of MANETs and WSNs are different so, there are some significant...
Mobile Ad hoc systems have recognized expanding mindfulness in the present couple of years. As of late, systems administration of unattended detecting gadgets has expected noteworthy consideration from the exploration group. In this paper we exhibit a survey investigation of lightweight proactive source steering conventions of Mobile Ad hoc systems. In this paper we likewise audit and analyze the...
Any decentralized, distributed network isvulnerable to the Sybil attack wherein a malicious node masquerade as several different nodes, called Sybil nodes disrupting the proper functioning of the network. A Sybil attacker can create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process,...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
Mobile Ad hoc Networks (MANETs) are the networks of mobile nodes which do not require any access points to communicate with each other within the radio range. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message security is of paramount importance in mobile ad-hoc networks. The paper proceeds with a brief introduction of MANETs followed by...
Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we...
Various reactive and proactive routing protocols are being used in Mobile ad hoc networks (MANETs). Dynamic Source Routing (DSR) is one of the reactive routing protocols but high overhead involved in flooding while route creation is a limiting factor of DSR protocol. The paper aims to minimize the number of route requests (RREQs), which is a significant source of overhead for the DSR. In this paper,...
In this letter, we propose a novel two-layered structured overlay, called a distributed Bloom filter table (DBFT), which is capable of substantially reducing overhead imposed by highly-dynamic peer-to-peer (P2P) distributed storage systems. More specifically, in our DBFT scheme, each node's ID remains unchanged, when the associated cluster changes due to the physical movement of the node. This provides...
IEEE 802.11 DCF protocol exhibit severe fairness problem in many scenarios. In this paper, the reasons why fairness problem appears is given and proved by simulation. The study reveals that the interference among contending MAC flows is different when fairness problem happens. This paper consider that different interference between MAC flows cause the DCF unfair. A parameter named FI (Fairness Indicator)...
Ad hoc networks are threatened by a wide variety of accidental and malicious faults. This fact limits the practical exploitation of ad hoc networks. In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults and attacks is of paramount importance. Accordingly, analysing and determining...
Cooperation enforcement in Mobile Ad Hoc Networks (MANET) and Wireless Sensor Networks (WSN) typically relies on separate detection and punishment schemes that isolate selfish nodes from routing and receiving network services. However, cooperative nodes then have to carry all the traffic. We propose a system that enforces cooperation smoothly and assures a fair distribution of bandwidth, as well as...
In this paper, we present the MPI2Java project, which allows researchers to use MPI1 functionalities of the actual MPI 2.0 specification in Java-based applications. We are now able to develop and process parallelised software applications within a modern high-level programming environment. Based on JNI2, a universal and adaptable interface was realised. Thereby, MPI2Java uses the performance-optimised...
This paper presents wireless multi-hop Ad hoc networks based on OLSR protocol for the special environments in underground mine to improve existing coal mine wireless network deficiencies. It has the characteristics of high bandwidth, low latency, and easy deployment, compatibility with coal mine industrial Ethernet and multimedia transmission. We designed and implemented coal mine coverage network,...
Jamming attack, in the form of either continuous or periodic, can easily be deployed in wireless network due to openness of the underlying medium. Traditional strategies do not work against jammer, therefore either nodes passively doze out till the jamming phase is over or they actively move out of the jammed region. For small devices having lesser or no mobility, channel hop is an alternate where...
The paper is devoted to logical implication of MANet's protocols for gateway discovery in IPv6 Wireless Sensor Networks (IPv6-WSN). We implement three approaches in NS-2 simulator and evaluate its performance under the specified field of the networks of gateway discovery. The performance results present the packet delivery ratio and delay of end to end communication networks. The AODV protocol is...
An established route probably fails before the end of the transmission session in a wireless ad hoc network where mobility is high. Due to this level of mobility, routing protocols frequently require rerouting that imposes data latency and bandwidth overhead. In this paper, we propose a novel geographic routing protocol called HZGR. We design HZGR based on Greedy Forwarding (GF). This makes HZGR simple...
Caching of frequently accessed data in mobile ad hoc networks is significant technique that can improve the date access availability and save the communication overhead. In this paper, we propose a novel scheme for cooperative cache placement in mobile ad hoc networks. In our scheme, cache place is developed to improve the utilization rate of caching data and the cache hit ratio. As a part of cooperative...
IEEE 802.15.4 is the emerging next generation wireless standard designed for low-rate wireless personal area networks (LR-WPAN), which suit wireless sensor networks applications. It attempts to provide a low cost, low power and short range wireless networking. The QoS is more challenging in heterogeneous wireless sensors networks, where a diverse mixture of sensors for monitoring temperature, pressure,...
This paper reports on work in progress on developing a unified co-evolutionary/pricing framework for Mobile Sensor Networks (MSN) self-organization. MSN self-organization involves cooperative sensor positioning and formation of a multi-hop Mobile Ad-hoc NETwork (MANET) enabling sensor information acquisition and communication while prolonging MSN life-span. A number of inherent MSN traits such as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.