The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Sybil attack is exceedingly detrimental and subtle to routing mechanism in ad-hoc network. In this paper we propose a framework in which the vulnerability to the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out under our extended strand space mode in order to further analyze the validity of the threats from the Sybil attackers...
An ad hoc network is a collection of computers (nodes)that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use demanding applications such as Voice over IP, videoconferencing, and streaming media when they are connected through an ad hoc network. Because over provisioning, a common technique in wired networks, is often impractical in...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
In wireless networks, security has become the prime factor of concern. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANETS), furthermore leads to a situation where it is very difficult to establish secure data transmission. Since the use of mobile equipments such as cellular phones or laptops is tremendously increasing and because of limited physical security, vulnerability...
Inter-vehicular communication is an important research area that is rapidly growing due to considerable advances in mobile and wireless communication technologies, as well as the growth of microprocessing capabilities inside today's cars, and other moving vehicles. A good amount of research has been done to exploit the different services that can be provided to enhance the safety and comfort of the...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Mobile ad-hoc networks are prone to a number of security threats. The fact that mobile ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such...
Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop scenario and resource constraint. An ad hoc node in mobile ad hoc networks operates as not only end terminal but also as an intermediate router. In this way, multi-hop scenario occurs in MANETs. This multi hop scenario demands...
Secure routing protocol attracts much more attention in mobile ad hoc networks for the purposes of secure data transmission. But the improvement of security often sacrifices the delivery rate or other QoS. We propose a secure routing protocol by integrating multipath routing and secret sharing, meanwhile, select efficient and secure multiple disjoint routes by integrating multiple metrics including...
Owing to characteristics of open medium, dynamic topology and distribution, the security of Mobile Ad hoc Network (MANET) is more rigorous than that of traditional network. Referring to the I-ADD process of security analysis, the paper analyzed features, insecurity factors and security threats of MANET. Aiming at the security requirements, the design requirements for network security defense of MANET...
In current research self-security management is of high interest. Wireless Ad hoc networks use mobile nodes to enable communication outside wireless communication zone. Attacks on wireless ad hoc network routing protocols disrupt network performance and reliability. In active black hole attacks on wireless networks; malicious nodes advertise the shortest path through the, between source and destination,...
Mobile ad hoc networks are networks of mobile hosts with wireless interfaces that can dynamically form a network without the aid of any pre-existing infrastructure or centralized administration. Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. Security is the one of the major issue in mobile ad hoc network some of the attacks...
With the ongoing progress of telecommunication has increased the want of mobility, wireless or mobile networks and this desire has already swapped the wired networks. The upcoming networks has totally different infrastructure and has different protocols and devices. These networks are infrastructure less and no dedicated protocols or devices are required to deploy such networks. The theme of this...
Currently, there are work related to selfish nodes in ad hoc mobile networks. In this paper, questions on the viability, validity, and presence of selfish nodes are raised and discussed. Various definitions and interpretations of the term ??selfishness?? are also presented, along with ways of determining and evaluating selfishness. In this paper, we introduce SCNP - Selfish Check Negotiation Protocol...
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the...
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called ??Black Hole?? attack...
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. Due to this nature of MANET, it is possible that there could be some malicious and selfish nodes that...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
A Mobile Ad-hoc NETwork (MANET) is a wireless network set up temporarily without a wired infrastructure (routers, switches, servers, cables, access points, etc.). The wireless nodes in a MANET may move around and each one of them may need to forward packets for other components in the network. Several routing protocols such as DSR, AODV and DSDV have been proposed to facilitate communication in such...
Ad hoc On-demand Distance Vector routing (AODV) is a widely adopted network routing protocol for Mobile Ad hoc Network (MANET). The design of AODV, however, paid little attention to security considerations, hence resulting in the vulnerability of such MANET to the black hole attack. On the basis of AODV, this paper proposes and implements AODV suffering black hole attack - BAODV (Bad Ad Hoc On-demand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.