The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Network has a wide range of applications in military and civilian domains. It is generally assumed that the nodes are trustworthy and cooperative in routing protocols of MANETs viz. AODV, DSR etc. This assumption makes wireless ad hoc network more prone to interception and manipulation which further open possibilities of various types of Denial of Service (DoS) attacks. In order to mitigate...
Sensor nodes collect the data from the environment and send to sink. But attackers corrupt data while transmitting therefore data security is main concern of wireless sensor network (WSN). In proposed protocol, we decrease the passive attack on sink node by decreasing the traffic on sink node. The simulation results demonstrates the proposed method can each node will compress their data before sending...
A Mobile Ad hoc Network (MANET) consists out of a collection of mobile nodes capable of sending and/or receiving wireless communications. MANETs are generally unstructured networks with no centralized administration. MANETs use routing algorithms to establish routes among nodes. This unstructured nature presents the opportunity for misbehaviour among nodes. Trust based MANET routing protocols have...
Wireless Sensor Networks (WSNs) have undergone tremendous technological advances over the last few years, and a broad range of ubiquitous computing applications have been enabled in the area of distributed sensing and control areas. To fully achieve the potentials of WSNs, designing a reliable and secure routing mechanism becomes critical. The intent of this work is to incorporate theories of trust...
Wireless sensor networks are used in many applications in military, ecological, health, and other areas. These applications often include the monitoring of sensitive information making the security issue one of the most important aspects to consider in this field. However, most of protocols optimize for the limited capabilities of sensor nodes and the application specific nature of the networks, but...
Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor,...
Wireless sensor networks (WSNs) have drawn a lot of attention and a lot of work has been done to provide an efficient communication infrastructure for these systems. This paper focuses on another -not so well studied- class of embedded networks: embedded networks used for control and automation purposes. In contrast to WSNs, these networks have a comparably stable infrastructure, with a low probability...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.