The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in Virtual Ad hoc Network (VAN) testbeds that can imitate a tactical MANET to a high level of fidelity. For applications, this is achieved by executing unmodified software...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
This paper discusses the trust management and extended model based on the trust chain establishment and management on trusted computing platform. The model was applied to distributed system based on mobile agent to enhance its security. For the problems of trust management in the extended mobile agent system, the extended alternant process between entities of mobile agent trust management system in...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes own responsibility of building their trust...
Wireless Sensor Networks (WSN) consists of sensor nodes that are networked and are deployed in unattended areas where security is very important. Security is considered as one of the vital issues in the area of sensor networks. This work proposes an efficient scheme that deals with the availability of a mobile node and introduces a session time within which the secured secret key remains valid. The...
Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future...
In this paper, a security architecture is designed based on the artificial immune system by using multi-agents in mobile ad hoc networks. There are two types of immunity-based agents: one is detection agent and the other is counterattack agent. Detection agents take charge of monitoring the nodes in the network, detecting the anomaly activities, and taking response to the invader, which may be viewed...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
In this paper, we study the challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, only a few solutions were proposed. In this paper, an Efficient and Distributed Detection (EDD) scheme and its variant, SEDD, are proposed to resist against node replication attacks in mobile sensor networks. The characteristics possessed by...
Studying biologically inspired systems had received a great interest in few last years. Artificial neural networks, evolutionary computation, DNA computation, and artificial immune systems are some of the researcher interest which can be highlighted. The human immune system (HIS) is a compound of molecules, cells, and organs which has established to perform several tasks; imperfect detection, distributed...
Mobile Ad Hoc Networks are one of the core enabling technologies for tactical environments such as those envisioned in future military operations and disaster relief scenarios. While a significant amount of research has focused on technology interoperability and protocol design, there has been less work addressing the security and information assurance requirements for such environments. Properly...
Security is a main concern in the establishment of tactical MANETs. Literature is abundant in defining protocol extensions to provide more secure MANET communications. Also many techniques have been developed to identify different types of network attacks, such as the wormhole attack, for example. However, all these security solutions are designed for specific routing protocols. In the absence of...
Delay tolerant applications allow time to be used as an additional degree of freedom for security mechanisms in mobile ad hoc networks. By introducing artificial delays for the communication of delay tolerant applications, we optimize the point in time for starting or continuing a transmission. We develop mechanisms to exploit the knowledge on the proximity of the sender, the receiver, and intermediate,...
Aimed at developing an effective approach to future sensor networks, we proposed for the first time the tiered mobile network architecture and triangle-grid model, studied the problem of wireless sensor network security detection and the nodes movement control policy. Based on the model, we proposed an immune intrusion detection schema and a dynamic two-anchor nodes localization algorithm with classified...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
An easy way to determine the state of a cell phone without the ownerpsilas knowledge is presented in this paper. The described method, combined with a form of patterning mobile userpsilas behavior (in terms of evaluating the mobile phonepsilas state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.