The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The specific characteristics of Mobile Ad Hoc Networks (MANETs) make secure transmission important issues in its research. In this paper, we present a scheme using soft encryption combined with multipath routing to provide security of data transmission over MANETs. In the scheme, the messages are divided into different parts and encrypted by simple operations such as XOR function and bits rearrangement...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
Mobile ad-hoc network (MANET) basically, consists of collection of mobile hosts incorporating wireless interfaces. These mobile nodes forms a transitory autonomous network and do not base on fixed infrastructure or central administration, rather they work on the principle of self-organized interconnections among mobile nodes. The idea at the core of the MANET technology is that while in movement when...
Many efforts have been done towards secure MANETs, but the conventional lines of defense are still inefficient to put all attacks off. This article examines survivable approaches whose goal is to enable networks to fulfill correctly their critical functions even in the presence of attacks or intrusions. We introduce the most relevant survivable MANET initiatives where either preventive or reactive...
Tactical mobile ad hoc networks (MANETs) impose special challenges for designing authentication schemes because of the hostile environments in which they may operate. In this paper, we propose a lightweight integrated authentication (LIA) scheme for tactical MANETs. Our proposal is a lightweight and efficient solution that is suitable for use in tactical MANETs because it has the following features:...
In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Therefore,the cooperation of nodes is very important. With lack of a prior trust relationship, misbehavior caused by selfishness or malice may severely degrade the performance of the network. The cooperative security schemes offer a reasonable effective solution...
Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond their base transceivers. Since routing is the backbone of any mobile ad hoc communication, thus if there occur any flaws in the routing, the whole of the communication would come down to a stand still...
With the increasing demand of ubiquitous computing, the interconnection of mobile ad hoc networks (MANETs) to Internet is also getting attractive, which is so-called hybrid or connected MANET. In MANET paradigm, routing is a challenging task due to mobility and the resulting inherent dynamic network topology. In many applications, multipath routing scheme is favorable than single-path routing due...
In mobile ad hoc networks (MANETs), multihop transmissions rely on nodes collaboration to correctly route and forward packets to their final destination. However, collaboration of intermediate nodes is not guaranteed and non-collaborative nodes may drop packets they are asked to forward. Such behaviour, known as packet dropping, results of nodespsila selfishness or maliciousness and has dramatic effects...
MANETs are highly vulnerable to attacks due to their characteristics such as the lack of infrastructure and wireless communication. Considerable improvements have been made towards providing ad hoc network security and existent solutions apply cryptography, intrusion detection systems or reputation systems. However, these conventional defense lines are inefficient to put all attacks and intrusions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.