The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
An ad hoc network is a collection of computers (nodes)that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use demanding applications such as Voice over IP, videoconferencing, and streaming media when they are connected through an ad hoc network. Because over provisioning, a common technique in wired networks, is often impractical in...
Secure routing protocol attracts much more attention in mobile ad hoc networks for the purposes of secure data transmission. But the improvement of security often sacrifices the delivery rate or other QoS. We propose a secure routing protocol by integrating multipath routing and secret sharing, meanwhile, select efficient and secure multiple disjoint routes by integrating multiple metrics including...
With the ongoing progress of telecommunication has increased the want of mobility, wireless or mobile networks and this desire has already swapped the wired networks. The upcoming networks has totally different infrastructure and has different protocols and devices. These networks are infrastructure less and no dedicated protocols or devices are required to deploy such networks. The theme of this...
It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad...
Clustering has been widely used in wireless ad hoc networks for various purposes such as routing, broadcasting and Qos. Many clustering algorithms have been proposed. However, most of them implicitly assume that nodes behave honestly in the clustering process. In practice, there might be some malicious nodes trying to manipulate the clustering process to make them serve as clusterheads, which can...
Due to the fact that the wireless links in an ad hoc network are susceptible to attacks and the nodal mobility renders the network to have a highly dynamic topology, it becomes critical to detect major attacks against the routing protocols of such networks and also provide some extent of QoS to the network traffic. In this paper, we present a new secure routing protocol (SRP) with quality of service...
In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is an essential component of a successful data transmission process. Since there is no central controller such as router to determine the communication paths in MANET, each node in the ad hoc network has to rely on each other...
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes and is connected by wireless links. In MANET cooperation of nodes for transmitting packets from source to destination cannot be assumed because of the selfish nature of the nodes. The pricing method is one method to provide incentives for the nodes to ensure cooperation. The QoS is of much attention recently due to the bandwidth...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.