The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose and present a framework for enabling policy-based routing in mobile ad hoc networks (MANETs) by applying policy rules associated with the security and reliability (of connection) to peer-to-peer security associations (SA) that are established on (multi-link) routes. In this proposal, we leverage and integrate the concept of dispersity routing with the management and maintenance of an existing...
Our modern densely populated cities have created an Achilles heel for public safety services where natural or man-made disasters often result in high casualties. The 2005 London bombings have exposed the inadequacy of current First Responder (FR) communication systems for modern response operations. Additionally, FR organisations presently pay a tariff each time Public Protection and Disaster Relief...
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns. In this paper, we will present survey of...
Due to wireless communication, dynamic topology, limited resources and lack of centralized administration, MANETs are vulnerable to various types of DoS attacks on network layer. In Gray hole and Black hole attacks malicious nodes deliberately disrupt data transmission in the network by sending incorrect routing information. It is a challenge to keep the communication route free from such attackers...
Ad hoc networks are formed with the help of their constituent wireless mobile nodes which are expected to forward packets for other nodes in a cooperative manner. Zone Routing Protocol; ZRP is one of such protocols that helps to create and maintain routes in spite of the dynamic network topology. This protocol is vulnerable to a number of security threats that come from internal malicious nodes which...
In Vehicular Ad Hoc Networks (VANET), trust establishment among vehicles is important to secure applications' integrity and reliability. In general, trust levels can be evaluated by monitoring the behavior of neighboring nodes and their generated messages based on events. However, obstacles can create a case of None Line of Sight (NLOS), which will interrupt direct communication among vehicles and...
Mobile Ad Hoc Networks (MANETs) offer a dynamic environment in which data exchange can occur without the need of a centralized server or human authority, providing that nodes cooperate among each other for routing. In such an environment, the protection of data en route to its destination is still a challenging issue in the presence of malevolent nodes. This paper proposes a message security approach...
In this paper, we investigate the effects of routing loop, sinkhole, and wormhole attacks on the position-based routing (PBR) in vehicular ad hoc networks (VANETs). We also introduce a new attack termed wormhole-aided sybil attack on PBR. Our study shows that the wormhole-aided sybil attack has the worst impact on the packet delivery in PBR. To ensure the reliability of PBR in VANETs, we propose a...
In wireless networks, security has become the prime factor of concern. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANETS), furthermore leads to a situation where it is very difficult to establish secure data transmission. Since the use of mobile equipments such as cellular phones or laptops is tremendously increasing and because of limited physical security, vulnerability...
Mobile ad-hoc networks are prone to a number of security threats. The fact that mobile ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such...
Nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets to enable communication between other nodes that are not in radio range with each other. However, whether for selfish or malicious reasons, a node may fail to cooperate during the network operations or even attempt to disturb them, both of which have been recognized as misbehaviors. Various trust management schemes have been...
As a comprehensive security system, researchers recently have turned to the human immune system as a very wealthy source of inspiration. DNA computation, evolutionary computation, artificial neural networks, and artificial immune systems are some of the research interest which can be pointed out. By means of diverse kinds of cells, molecules, and mechanisms, the immune system efficiently protects...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
Ad Hoc network is brittle and vulnerable because of its special characteristics: dynamic topology, multi-hop wireless communication, and restricted resources. Attacks emerge endlessly aiming at the routing protocols and the network. First, we analyze the security goals and threats in the paper. And then a neighbor sensor election method, a competition mechanism, is described. Neighbor sensors cooperate...
Disruption-tolerant networks (DTNs) provide a promising low-cost solution to transfer data in network environment where the connectivity is sporadic and unpredictable. Many existing methods for opportunistic data forwarding depend on the hypothesis that every node forwards messages regardless of the identities of the senders or receivers, however, the networks based on such methods are fragile under...
The specific characteristics of Mobile Ad Hoc Networks (MANETs) make secure transmission important issues in its research. In this paper, we present a scheme using soft encryption combined with multipath routing to provide security of data transmission over MANETs. In the scheme, the messages are divided into different parts and encrypted by simple operations such as XOR function and bits rearrangement...
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network,...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach...
Muli-hop cellular network is a promising network architecture which incorporates the ad hoc characteristic into the cellular system aiming to improve current cellular network performance. Unlike single hop cellular network, due to involving autonomous devices in packet forwarding, routing process suffers from new security challenges which endanger the practical implementation of the network. One security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.