The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heterogeneous Nodes in a Mobile Ad Hoc NET-work(MANET) are having very constrained resources like memory, bandwidth, CPU speed, battery life etc. Here, Heterogeneous Nodes means, all/few nodes are having variety of functionality. Irrespective of having higher secured nodes and security algorithms in MANETs, some time, the honest nodes can be accessed by fraud/malicious nodes or simply attacked by...
MANETs hold the potential to replace the existing wireless technology mainly because of the features it provides like ease of deployment, no need of infrastructure, support of dynamic topology, etc. Therefore, addressing the issues of MANETs is very important. Security of MANETs has always been an important issue affecting their reliability and even their usability and that of routing algorithms plays...
Mobile Ad-hoc NETwork which shows promising applications have now gained significant importance in research as well as in practice, due to their autonomous and self-maintaining nature. Unlike other types of networks, MANETs are usually deployed without a centralized control unit. Hence, mutual cooperation amongst the participating entities forms the basis for determining the routes to the destination...
A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled...
In wireless networks, security has become the prime factor of concern. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANETS), furthermore leads to a situation where it is very difficult to establish secure data transmission. Since the use of mobile equipments such as cellular phones or laptops is tremendously increasing and because of limited physical security, vulnerability...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. A store-and-forward network architecture known as the disruption tolerant network (DTN) has been designed for such challenging network environments. To further improve the delivery performance, some researchers have proposed some network coding schemes for DTNs. However, not much papers discuss the...
Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on...
With the increasing demand of mobility and ad hoc networking, vulnerability of wireless networks is also becoming a crucial issue. This dissertation sheds light on the security features of wireless communication, and proposes a model with an increased integration of security features. The proposed model, a ranked neighbor discovery (RND), and a security adaptive ad-hoc on-demand distance vector (SA-AODV)...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.