The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, performing network functions consumes energy and other resources. Therefore, some network nodes may decide against cooperating with others; selfish nodes. Also security issues are more paramount in such networks even more so than in wired...
The following topics are dealt with: security; mobile networks; SOA; monitoring; fault diagnosis; middleware; data management; complex systems; and dependable network computing.
We address the problem of efficiently revoking certificates of malicious and compromised nodes in vehicular networks. As in previous work, our focus is making sure that vehicles receive the new list of revoked certificates (CRL) before they can be compromised. Unlike previous solutions, our work revolves around the idea of making use of existing capabilities offered by mobile network operators to...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust...
MANET is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Each node in this network relays its neighbors for routing and message forwarding. Cooperation between nodes should be established without any centralized authority. However, neighbor based communication without any trust worthiness creates a major...
A malicious node in mobile ad hoc networks (MANETs) can falsify a route advertisement, overwhelming traffic without forwarding it, helps in forwarding corrupted data, and injecting of false or uncompleted information. Mapping immune system security mechanisms to networking security can powerfully contribute in securing MANETs, since both are sharing some similar features because of the distributability...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
In this paper, we study the challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, only a few solutions were proposed. In this paper, an Efficient and Distributed Detection (EDD) scheme and its variant, SEDD, are proposed to resist against node replication attacks in mobile sensor networks. The characteristics possessed by...
Automated animal monitoring with energy efficient wireless devices mounted on the animals can improve efficiency of farming industry and increase its profitability by decreasing reliance on human labor. We discuss the practical deployment of delay tolerant store and forward cattle monitoring architecture that provides data retention, detecting custom events, notification issuing, remote and in-situ...
We propose a reduced-complexity genetic algorithm for intrusion detection of resource constrained multi-hop mobile sensor networks. Traditional intrusion detection mechanisms have limited applicability to the sensor networks due to scarce battery and processing resources. Therefore, an effective scheme would require a power efficient and lightweight approach to identify malicious attacks. The goal...
Existing investigation schemes are not suitable to cope with attacks in wireless networks, especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in wireless environment, and system and network evidences generated consequently. We develop an inference system that integrates...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
Mobile ad hoc networks (MANET) are becoming an important research aspect due to the self-organization network, dynamically changing topology, temporary network life and wireless nature of communication. Due to these characteristics, the nodes in MANET are subject to various attacks and malicious activities. This paper presents a model for analyzing these misbehaviors using game theory. This model...
Security is a main concern in the establishment of tactical MANETs. Literature is abundant in defining protocol extensions to provide more secure MANET communications. Also many techniques have been developed to identify different types of network attacks, such as the wormhole attack, for example. However, all these security solutions are designed for specific routing protocols. In the absence of...
Recently, immunology inspiration has been more flourishing in helping to put up the wonderful defense, basically in securing ad hoc networks. Imperfect detection, anomaly detection, memory response, diversity, and adaptive detection, all are some of the immune features that offer a worthy concept for solving security problems. The essence of the immune system is the ability to discriminate between...
Mobile ad hoc networks is a dynamic wireless self-organizing networks. Routing techniques is a greatly import part of wireless networks protocol. Some recent routing protocol take into account secure factor, but these protocols yet cannot sufficient the actual demand because of the various forms of attacks to mobile self-organizing networks and self frangibility of mobile ad hoc networks. In this...
Delay tolerant applications allow time to be used as an additional degree of freedom for security mechanisms in mobile ad hoc networks. By introducing artificial delays for the communication of delay tolerant applications, we optimize the point in time for starting or continuing a transmission. We develop mechanisms to exploit the knowledge on the proximity of the sender, the receiver, and intermediate,...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
The proposed paper describes the ease of security while on the go, by using the PDA from any where. The system will recognize the user and then connect the user with its server to handle the security devices installed on the station. In our proposed system we have two setups, one as client (PDA) and other as server (home base).The client will gain access through a WAP with the server using username...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.