The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Mobile Ad hoc network consists of a collection of mobile nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously acts as both router and host. Nodes can leave or join the network freely. Destination Sequence Distance Vector (DSDV) is a modification of the conventional Bellman-Ford routing algorithm for ad hoc networks. Dynamic topology of ad hoc networks makes...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic...
There has been a tremendous interest in recent years in the design of mobile ad hoc networks (MANETs) because of their dynamic topology, self-organization and ease of deployment. However, the lack of security in their routing protocols make MANETs vulnerable to a variety of routing intrusions that can compromise the data or the entire network itself. This paper presents a novel scheme for the detection...
The Sybil attack is exceedingly detrimental and subtle to routing mechanism in ad-hoc network. In this paper we propose a framework in which the vulnerability to the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out under our extended strand space mode in order to further analyze the validity of the threats from the Sybil attackers...
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
In these days, IEEE802.16 protocol is being developed and in the next years, 802.16 modems will be used in every house to connect to the Internet through base-stations in both urban and rural areas. Since user bandwidth for connection to the Internet is limited, a large fraction of each modempsilas bandwidth is not used. In this paper, we propose an architecture to construct a public peer-to-peer...
A mobile ad hoc network is a collection of wireless nodes without any existing network infrastructure or centralized administration. It applies some special routing protocols, e.g. Ad hoc On-demand Distance Vector (AODV) routing protocol, having the ability to forward the packets in dynamic network topology. The existing routing protocols can be divided into unsecure and secure protocols. They could...
Mobile ad hoc networks (MANETs) have many well-known applications in military settings as well as in emergency and rescue operations. However, a lack of infrastructure and centralized control make MANETs inherently insecure, and therefore specialized security services are needed for their deployment. Self-certification is an essential and fundamental security service in MANETs. It is needed to securely...
We propose in this paper a framework for digital investigation of security incidents in multi-hop wireless systems. A cooperative observation network, composed of randomly distributed observer nodes, is set up to monitor nodes mobility, topology variation, and patterns of executed actions. A set of techniques to aggregate, merge, and analyze evidences is proposed to reconstruct potential attack scenarios...
IP traceback in MANET (mobile ad-hoc network) is more difficult than in traditional wired network because of the dynamically-changing topologies and limitation in resource. Researches in IP traceback for MANET largely follow the similar approaches as in the wired network and are having difficulties in overcoming the above mentioned topology and resource limitation problem. We suggest to cope with...
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this paper, we observe the detailed actions of a security association in the procedure of establishment and shift, in a wireless mesh network (WMN), i.e. a typical multi-hop network. To investigate...
Due to the insecure nature of the wireless media, the dynamically changing topology and lack of infrastructure, security in mobile ad hoc networks is hard to achieve. In this paper we present an analysis of a message-relaying based key distribution scheme for mobile ad hoc networks that was previously proposed by van der Merwe et al. Considering the message overhead occurring at the MAC layer in addition...
With the increasing demand of ubiquitous computing, the interconnection of mobile ad hoc networks (MANETs) to Internet is also getting attractive, which is so-called hybrid or connected MANET. In MANET paradigm, routing is a challenging task due to mobility and the resulting inherent dynamic network topology. In many applications, multipath routing scheme is favorable than single-path routing due...
In recent years, various routing protocols have been proposed for ad hoc networks. Most of these protocols are based upon simulation and security. These protocols still lack in terms of performance efficiency of routing protocols such as avoidance of route breaking, sensing of breakage in route, security and reliability (basically authentication of mobile hops in the real ad hoc networks. i.e. during...
The following topics were dealt with: routing; security and privacy; forwarding protocols; cooperative communication; disconnection tolerance; network modeling and analysis; sensor coverage; localization and ranging; medium access; topology control; energy management; fault tolerance; IEEE 802.11; IEEE 802.16; wireless sensor networks; and ad hoc networks
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.