The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means “for this purpose” formed network instantly when nodes are connected in network for communication. Ad hoc network is a temporary network built for specific purpose. It does not require any pre-established infrastructure. The dynamic nature of ad hoc networks makes them more utilisable. On the other hand, selfish...
Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the...
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the...
Mobile Ad Hoc Networks (MANETs) is a collection of mobile nodes connected with wireless links. Security a major challenge for these networks. All the nodes in MANET must co-operate with each other to route the packets. In any network the nodes are trust each other nodes. There are many trust management schemes to provide general framework for trust evidence in manets but these schemes cannot provide...
In Vehicular Ad Hoc Networks (VANET), trust establishment among vehicles is important to secure applications' integrity and reliability. In general, trust levels can be evaluated by monitoring the behavior of neighboring nodes and their generated messages based on events. However, obstacles can create a case of None Line of Sight (NLOS), which will interrupt direct communication among vehicles and...
Unattended Wireless Sensor Networks (UWSNs) are networks that operate without on-line data collection entities (Sink Collectors). This configuration enriches their flexibility but, at the same time, introduces new security issues. A challenging issue is data survival: in absence of the sink, in fact, data sensed by network sensors cannot be kept clear from the adversary. Cryptographic schemes, moreover,...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
Wireless sensor networks are specific adhoc networks. They are characterized by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show what are the specificities and vulnerabilities of wireless sensor networks. We present a list of attacks, which can be found in these particular networks, and how they use their vulnerabilities...
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed via mobile nodes without any prior knowledge of the existing nodes which may not be trustworthy. Trust management appears to be a promising approach...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
Mobile ad hoc network is a special peer-to-peer network with a wide range of application that has no infrastructure, multi-hop, self-organizing, dynamically reconfiguration and mobile. People are now paying more and more attention to the using of ad hoc network in the emergence area such as battlefield and disaster rescue. The research on its energy and security are one of the most important aspects...
Considerable advancements in the technology of wireless sensor networks (WSNs) are taking place due to smaller, and more efficient electronic devices which are capable of increased processing power, and communication capabilities. In addition, the cost of such devices is constantly decreasing, which makes it possible to employ large quantities of networked sensors in numerous commercial, environmental,...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
With the development of WSNs in the military and commercial fields, the security of WSNs is becoming more and more important. The security threats of wireless sensor networks (WSNs) come from not only the attacks of external attackers but also the byzantine behaviors and selfish behaviors of internal nodes. The classical security mechanisms, namely cryptography and authentication, can prevent some...
Mobile ad hoc networks is a dynamic wireless self-organizing networks. Routing techniques is a greatly import part of wireless networks protocol. Some recent routing protocol take into account secure factor, but these protocols yet cannot sufficient the actual demand because of the various forms of attacks to mobile self-organizing networks and self frangibility of mobile ad hoc networks. In this...
This paper presents a power-aware secure routing protocol for wireless embedded networks (WENs). We propose an efficient secure relay scheme called ESRS for ad-hoc-based embedded-network communications. ESRS is a two-phase scheme which includes end-to-end secure channel establishment and relay-behavior monitoring. With end-to-end secure channel establishment, the transmitted data will be protected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.