The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning play an important role in our society, give rise to systems that can manage themselves. WSNs have been used in various industrial applications, where reliability...
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
This paper investigates data aggregation techniques for low power, distributed wireless networks. Nodes in such networks are constrained in terms of processing power, cost, networking performance, and available energy for the transmission of generated data. Additionally, the sensitive nature of data collected by the networks and physical vulnerability of nodes suggests that end-to-end encryption needs...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
The security routing protocols practiced in a wireless sensor network are not enough to thwart the potential security breaches in heterogeneous wireless sensor networks. After reviewing the existing research methodologies to resist the adversaries, it was found that existing techniques are either computationally expensive process or lead to communication overhead. Therefore, this paper presents a...
In security context, mobile ad-hoc network is more vulnerable compare to conventional networks because of open environment and lack of physical tight proximity. Therefore attackers get opportunity to commit crime using these vulnerable points. Several types of attacks committed by attackers to impact network functioning and performance. Attacks committed by intruders that are part of network and compromised...
Message authentication is a mechanism to verity the integrity of a message and it can be achieved using Message Authentication code (MAC) also called as keyed hash function. An ideal Hash algorithm will require a cryptanalytic effort greater than or equal to the brut-force effort. In the recent time, there have been enough efforts in developing cryptanalytic attacks on Hash algorithms. The hash algorithms...
To ensure the security of the data forwarding and requirement of QoS(Quality of Services) in wireless sensor networks, we propose an ant colony optimization-based trustful routing algorithm. The objective function includes the key factors, such as the time delay, the bandwidth and the energy consumption of the link from the source to the destination. Also, in order to optimize the path selection,...
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed...
With the increased numbers of mobile devices working in an ad hoc manner, there are many problems in secure routing protocols. Finding a path between source and destination faces more challenges in Mobile ad hoc network (MANET) environment because of the node movement and frequent topology changes, besides, the dependence on the intermediate nodes to relay packets. Therefore, trust technique is utilised...
Base station (BS) location privacy has been widely studied and researched in different applications like field monitoring, agriculture, industry and military etc. The purpose is to hide the location of BS from outside/inside attacker in any shape. Hundreds of thousands of sensor nodes are deployed in some area, bring lot of new challenges regarding routing, forwarding, scaling and security. Different...
Modern society is becoming increasingly dependent on various communication networks such as the Internet and the sensor networks. These networks need strong security measures to keep the traffic secure. If the security fails, many aspects of the society may suffer. In this paper, we address the network security challenge by focusing on one integral part of the network functionality: routing. Using...
A Mobile Adhoc Network is a infrastructure-less and self configurable network of mobile devices which are connected without physical cable. A novel approach has been proposed, where the communication in a network works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between devices and to validate the packets. Since the validation is based...
The Delay/Disruption Tolerant Network (DTN) is characterized with intermittently connectivity and frequent partitions. Due to this, the DTN routing algorithm is very vulnerable to various kinds of malicious attacks. In this paper, combined with many other DTN forwarding approaches, we propose a multi-stage routing forwarding algorithm so as to further improve network throughput. To ensure the security...
To reduce the route length of MSW collection without intermediate facilities, A Waste Collection Vehicle Arc Routing Problem with turn constraints (WCVARPTC) model was proposed, which considers the actual traffic regulations: some streets can be traversed in only one direction, some turns will be forbidden when the common angle is too narrow. An asymmetric vehicle node routing problem (AVNRP) model...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. Many protocols have been developed to accommodate the features of OppNets such as frequent partitions, long delays, and no end-to-end path between the source and destination nodes. Embedding security into these protocols is challenging and has taken a lot of attention in research. One of the attacks...
Wireless sensor network is typically used to detect and monitor various types of objects in real-time monitoring area in which security is one major challenge. Evaluation of nodes' trust is proven to be an effective solution of improving security, supporting decision-making and nodes collaboration in both wired and wireless networks. However, existing approaches of trust management emphasize mostly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.