The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
Routing and security is a major issue in mobile ad-hoc networks due to dynamic network topology. Each node may compromise the packet routing functionality by disrupting the route discovery technique. Clustering divides a physical network into disjoint virtual sub networks in each cluster consisting of fewer nodes. The cluster based routing schemes in Mobile ad-hoc network are used to reduce the channel...
Vehicular Delay Tolerant Networking (VDTN) is a special instance of Vehicular Ad hoc Networking (VANET) and in particular Delay Tolerant Networking (DTN) that utilizes infrastructure to enhance connectivity in challenged environments. While VANETs assume end-to-end connectivity, DTNs and VDTNs do not. Such networks are characterized by dynamic topology, partitioning due to lack of end-to-end connectivity,...
AdHoc network plays an important role for critical scenario such as military services, law enforcement as well as in emergency rescue operation. In such type of request, it requires security and privacy for the underlying routing protocol. As it is a communications less and source limit network, it is very important to propose secure based energy efficient routing protocol. In order to provide a secure...
Pervasive computing and communications are (slowly) enabling local ad-hoc services. Preserving privacy in a pervasive environment is one of the key challenges ahead: How can users define their “communication boundaries”? how can the network avoid wasting resources and eventually collapse under the burden of undesired traffic that will be discarded at the receiver machine? In this paper we propose...
Due to the broadcast nature of wireless transmissions, communications in mobile ad hoc networks (MANETs) are more subject to malicious traffic analysis. In spite of the secure routing protocols, traffic analysis attacks are still not well addressed. Indeed, these protocols focus on security of route maintaining and defending against modification of routing information, which cannot prevent traffic...
As a combination of ad hoc networks and wireless local area network (WLAN), the wireless mesh network (WMN) provides a low-cost convenient solution to the last-mile network-connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are no longer applicable in WMNs. On the other hand, little research has focused on privacy-preserving...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
Anonymous routing is a value-added technique used in mobile ad hoc networks for the purposes of security and privacy concerns. It has inspired lot of research interest, but very few measures exist to trust-aware routing for anonymity protection. This paper proposes a reliable anonymous MANET routing protocol in the sense that the communicating parties are capable of choosing a secure end-to-end route...
As a prospective intelligent transport systems (ITS) technology, vehicular ad hoc networks (VANETs) have recently been attracting an increasing attention from both research and industry communities. These networks have no fixed infrastructure and instead rely on vehicles themselves to provide network functionality. In this paper we review the related literature on VANETs characteristics and provide...
Anonymous communication methods, try to prevent traffic analysis attacks by hiding nodes' identities from outside observers. As a result, adversaries can not find any correlation between observed traffic patterns and nodes' real information. In this paper, we have introduced PseudoAODV protocol in which origin identifiers of nodes are replaced by randomly generated pseudonyms in ad hoc on demand distance...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
The following topics were dealt with: routing; security and privacy; forwarding protocols; cooperative communication; disconnection tolerance; network modeling and analysis; sensor coverage; localization and ranging; medium access; topology control; energy management; fault tolerance; IEEE 802.11; IEEE 802.16; wireless sensor networks; and ad hoc networks
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.