The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information-centric networking (ICN) stands out as a promising solution to replace the Internet. In the ICN architecture, the content is the major element and the data name is used for routing the content, instead of the address location as in the Internet nowadays. Furthermore, it is desirable to cache as much data as possible near the user, aiming to improve performance and reduce data transfer...
Reliable Node based routing (RNBR) is a trust based routing protocol for mobile adhoc network which presents reliable nodes for efficient routing to achieve high throughput. It is always a challenge to secure a node from internal and external adversaries' attack, which impact the reliability of the node. This paper presents a light weight node securing mechanism to prevent node from various attacks...
Vehicular Ad-hoc Network has become an active area of research which provides mobile communication among vehicles on road. It has tremendous potential to improve passenger safety on road, traffic efficiency, convenience as well as comfort for both drivers and passengers. It also delivers several other applications such as internet connectivity, smart parking, passengers could share music, videos,...
This paper presents the designed concept to improve the public key infrastructure deploy ability in the mobile ad-hoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node's trustworthiness and two levels of interoperability...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
Mobile Ad hoc networks are composed of self organizing, multi-relaying nodes that do not rely on a fixed infrastructure and are lack of any centralized control. These characteristics make it to suffer from ineffective network performance and security attacks. Clustering have been devoted to organize all the nodes in mobile ad hoc network into a grouping architecture because it can provide basic levels...
Sybil attack is the most prominent and challenging attack in open-access distributed systems like peer-to-peer systems. In sybil attack, a malicious user creates multiple fake identities called sybil identities leading to most of the honest nodes in the network to be controlled by them. Many centralized approaches being available, the proposed protocol uses a decentralized approach to defend against...
MANETs are an ideal technology to deploy spontaneous wireless infrastructure-less networks, either for military or civilian applications. The absence of centralized administration and infrastructure-less nature gives rise to authentication and key management problems in the MANETs. Recently, several approaches have been proposed for the authentication mechanisms. Among of them, certificate chain based...
The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable network entities to anonymously and securely communicate with each other. However, protocols that provide a high level of anonymity generally have poor scalability due to delays and overhead introduced by cryptographic operations, while other approaches sacrifice anonymity to achieve better performance. In this paper,...
A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Design of an efficient and...
The wireless local area network (WLAN) technology has a rapid development because its advantages of fast and high-efficient, flexible and easy in net building. Wireless network brings users convenient network service, but it also hides many security problems that hinder WLAN's development. This paper combines the accountability of IP address with trust routing to a second mechanism applied in WLAN...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
In the anonymous communication mechanisms based on key infrastructure, public key or pre-shared key are widely used to set up relay paths and negotiate shared keys in session. Therefore, these systems always have complicated architecture and high key management cost. However, key infrastructure is hard to deployed in distributed environment. Based on multi-paths network coding, this paper firstly...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
In this paper, we present a novel security solution known as global public key algorithm based on bilinear pairing cryptography concept, for location service in vehicular ad-hoc networks (VANETs). Indeed, many geographic routing protocols used in VANET need location service for obtaining destination position. The location service makes way for major security concern in VANETs. We design an efficient...
In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based blacklists (DNSBLs) of IP addresses of mail relays that forward spam. Implementing a blacklist on a DHT improves resilience to DoS attacks and secures message delivery, when compared to DNSBLs. However, due to the sensitive nature...
In structured P2P systems, peers and keys of content objects are identified using a set of well defined IDs. Queries are routed towards the target with a certain ID. When one ore more nodes are malicious, they may prevent correct message routing. Alternate routing pathes can be used to circumvent them. As a result, the routing latency consists of two parts: normal routing latency and extra routing...
Although several energy-conserving security architectures have been proposed in wireless sensor networks so far, these architectures still need improvements to resist against routing attacks. In this paper, we propose a key management scheme and a routing algorithm called ripple-beaconing, with no redundancy between them. The two improve routing security and control and help in node localization and...
Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on...
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.