The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc networks are composed of self organizing, multi-relaying nodes that do not rely on a fixed infrastructure and are lack of any centralized control. These characteristics make it to suffer from ineffective network performance and security attacks. Clustering have been devoted to organize all the nodes in mobile ad hoc network into a grouping architecture because it can provide basic levels...
MANETs are an ideal technology to deploy spontaneous wireless infrastructure-less networks, either for military or civilian applications. The absence of centralized administration and infrastructure-less nature gives rise to authentication and key management problems in the MANETs. Recently, several approaches have been proposed for the authentication mechanisms. Among of them, certificate chain based...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
In this paper, we present a novel security solution known as global public key algorithm based on bilinear pairing cryptography concept, for location service in vehicular ad-hoc networks (VANETs). Indeed, many geographic routing protocols used in VANET need location service for obtaining destination position. The location service makes way for major security concern in VANETs. We design an efficient...
Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
Due to the fact that the wireless links in an ad hoc network are susceptible to attacks and the nodal mobility renders the network to have a highly dynamic topology, it becomes critical to detect major attacks against the routing protocols of such networks and also provide some extent of QoS to the network traffic. In this paper, we present a new secure routing protocol (SRP) with quality of service...
A mobile ad hoc network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. In particular, the route security is more important. In order to solve the problem several route discovery protocols have been proposed such as ARAN and SRP ect. But those protocols suffer from two problems: (1) difficult in operation, (2)...
Tactical mobile ad hoc networks (MANETs) impose special challenges for designing authentication schemes because of the hostile environments in which they may operate. In this paper, we propose a lightweight integrated authentication (LIA) scheme for tactical MANETs. Our proposal is a lightweight and efficient solution that is suitable for use in tactical MANETs because it has the following features:...
This paper proposes a new secure routing protocol, named secure optimal reactive routing protocol (SORRP) for mobile ad-hoc networks. The work is based on ORRP, reported in one of our earlier works. In spite of being a reactive protocol, SORRP does not use flooding and at the same time finds the optimal path in terms of minimal routing distance. The current work improves ORRP in a two-fold approach...
According to augmentation about interests for privacy in mobile network over the past few years, researches that provide the anonymity have been conducted in a number of applications. Ad hoc routing protocols with the provisions for anonymity both protect the privacy of nodes and also restrict the collection of network information by malicious nodes. Until recently, quite a number of anonymous routing...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.