The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) is increasingly being used in data centers as well as enterprise networks. In an environment that has strict compliance requirements, such as HIPAA compliance, a critical role for an SDN controller is to route all data packets while considering data privacy preservation and compliance-preservation. In this paper, we address this problem by proposing a routing protocol...
In Major WSN and MANET routing protocols mainly deals with energy efficiency, routing and band width and their basic Para-mounts like energy efficiency, power consumption and resource constraints based on energy transmission from source to destination. The main idea is to design a protocol which configures the multipath routes based on random choice of path from which it gains a optimal routing with...
With the ability to work under critical environments where human interception is difficult, wireless sensor networks serves as a useful communication means for data transmission and collection. But like other wireless networks WSN is also prone to adversary interventions. So the researchers are addressing this issue to make routing protocols secure for communication. But due to the severe resource...
A Wireless Sensor Network (WSN) is a wireless network consisting of small sensor nodes. Sensors are used to monitor physical or environmental conditions. WSNs are particularly used in military and civilian applications. As WSNs are generally deployed in an unattended area, they are prone to various types of attacks. One of the harmful attacks is Sybil attack in which a node illegitimately claims multiple...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
Providing complete coverage of sensing field as long as possible and maintaining the connectivity between the nodes is the main motto of the Wireless Sensor networks. The proposed system is implemented to provide maximum connectivity and extension in network-lifetime along with providing secured data transmission which is required for many applications. Maximum connected load balance cover tree algorithm...
Routing protocols is one of the key technologies in Wireless Sensor Network (WSN). More and more studies focus on the connectivity and secure communication between nodes in WSN. In this paper, according to the network structure in WSN, we classify the routing protocols into three categories, namely Data-centric protocol, Geographic routing protocol and Hierarchical routing protocol. An overview of...
In this paper, we propose a novel routing protocol by overcoming the security issues of node disjoint multipath routing protocols to ensure the reliability by discovering multiple secure paths. The proposed protocol considers link compromise probabilities to generate multiple routes with low compromise probabilities. Contrary to contemporary distance metric multipath routing protocols, our proposed...
Distributed cooperative spectrum sensing is an effective and feasible approach to detect primary users in Cognitive Radio Mobile Ad Hoc NETworks (CR-MANETs). However, due to the dynamic and interdependent characteristics of this approach, malicious attackers can interrupt the normal spectrum sensing more easily in open environments by spectrum sensing data falsification attacks. Meanwhile, attackers...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
Event source anonymity is potentially an important aspect of secure wireless sensor networks (WSN). The existing schemes developed for wired networks do not work in WSNs due to the characteristics of radio transmission and limited resources. A recent article proposed several solutions for the strong global adversary model. The protocols depend on dummy messages and special proxy nodes that filter...
Node capture attacks are one prospective kind of attack on WSNs. To prevent node capture attacks, we have proposed secure decentralized data transfer against node capture attacks, previously. In this proposed method, the existence of multiple paths was assumed to be the case. In this paper, we have proposed taking into account the multipath routing of our previously proposed method. To make multiple...
In order to degrade the selfish behavior and encourage more members to participate in anonymous communication, a reputation-based incentive mechanism is used in the structured peer-to-peer overlay networks. According to the initiator's reputation, the request is transmitted or retransmitted by the members in the system. The performance of the reputation-based anonymous communication system is analyzed...
In order to degrade the self participants in the peer-to-peer overlay networks, a rerouting-based anonymous communication strategy respect with reputation mechanism, which does not need an administrating node, is put forward in this paper. The degree of anonymity of the inactive participant is degraded by the value of reputation, and the active participants achieve better degree of anonymity in the...
From the aspect of inter-domain routing security, it is important to identify the critical ASes which transmit a large fraction of data traffic. By analyzing the BGP routing process under the control of routing polices and evaluating a series of Transmit factors, we realize that BGP routing system has a Hinge-Transmit property. It indicates that Tier-1 AS set is the hinge of the Internet, transmitting...
Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver...
Prospect residential secondary services (smart metering, time-of-use scheduling, dispersed generation tracking, etc.) may account for potentially thousands of devices through networked load-management-collaborative (LMC) computing to realize smart distribution systems. Although TCP/IP-based networks can provide communication infrastructure for these devices, a severe security issue will present, as...
Within the next 10-15 years, air-traffic management (ATM) will be primarily based on data communications and voice communication will be mostly used as fallback solution. Furthermore, it is foreseen that IP-based networking solutions for A/G communication will be deployed for cost savings, high reliability and an optimal alignment with the evolution of communication and security technologies. Such...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.