Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Trust Management Frameworks (TMFs) are being used to improve the efficiency, security, and reliability of decentralized and distributed autonomous MANETs using metrics garnered from the communications activities of nodes within the networks. However, these do not perform well in sparse / harsh environments such as those found in Underwater Acoustic Networks (UANs) [1]. As node capabilities increase,...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Message authentication is a mechanism to verity the integrity of a message and it can be achieved using Message Authentication code (MAC) also called as keyed hash function. An ideal Hash algorithm will require a cryptanalytic effort greater than or equal to the brut-force effort. In the recent time, there have been enough efforts in developing cryptanalytic attacks on Hash algorithms. The hash algorithms...
Reputation systems are an emerging area of research in ad-hoc networks. They have been introduced as a security solution for nodes' misbehaving problem. A reputation system should cope with any kind of misbehavior. It enables honest nodes to make fair decisions about their neighbors. This may encourage nodes to behave well and cooperate in order to avoid being penalized or isolated. In this paper,...
Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types...
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. In a distributed Mobile Ad Hoc Network (MANET), collaboration and cooperation is critical concern to managing trust. The networks work well only if the mobile nodes are trusty and behave cooperatively. Due to the openness in network topology and absence of a centralized...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
MANETs hold the potential to replace the existing wireless technology mainly because of the features it provides like ease of deployment, no need of infrastructure, support of dynamic topology, etc. Therefore, addressing the issues of MANETs is very important. Security of MANETs has always been an important issue affecting their reliability and even their usability and that of routing algorithms plays...
This paper addresses security and performance issues of MANET. A novel cluster oriented concept is proposed to enhance security and efficiency of the network. Proposed strategy insures the optimum performance of MANET in presence of black hole attack. The simulation of the proposed methodology is carried out using NS2 network simulator and the simulation results reflects the performance of scheme...
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.