The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless networks have an important role for development and simply use in human society. In order to categorization of applications, MANETs give a unique range for monitoring and surveillance. MANETs is used to deploy into distant areas for sensing and processing desired information. Due to distributed and open nature of MANET, it is vulnerable and occupied for attacked to intercept and despoil network...
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of...
A Mobile Adhoc Network is a infrastructure-less and self configurable network of mobile devices which are connected without physical cable. A novel approach has been proposed, where the communication in a network works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between devices and to validate the packets. Since the validation is based...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
Battery driven devices are need more routing strategy and their caring to safe against attack. WSN is also vulnerable to attack like wormhole, in which a malicious node captures packets from one location (or from intermediated path) in the network, and channelized it to the wrong direction towards another malicious node at a remote point, that recursively replays it again or start dropping. A wormhole...
Distributed wireless networks have become popular due to the evolution of the Internet-of-Things. These networks utilize ad-hoc routing protocols to interconnecting all nodes. Each peer forwards data for other nodes on the basis of network connectivity and a set of conventions that is determined by the routing protocol. Still, these protocols fail to protect legitimate nodes against several types...
Mobile adhoc networks (MANETs) consist of mobile nodes with no fixed infrastructure. Dynamic Source Routing (DSR) which is on-demand routing protocol is a widely accepted mobile adhoc network routing protocol used to provide connectivity to mobile nodes. However, DSR and other on-demand routing protocols are vulnerable to different types of security attacks and black hole attack is one of them. In...
In mobile ad hoc networks (MANETs), nodes have to cooperate in order to accomplish routing tasks. Nevertheless, they are generally composed of limited resources and may behave in a selfish way. In this paper, we propose a trust model for reactive routing in MANETs. The proposed solution is founded on a mechanism inspired by the CONFIDANT protocol to install and update trust in the network. It fits...
Routing is a fundamental networking function in every communication system including wireless Ad hoc networks. Operation of the entire network can be affected by attacking the service. Such attacks can be performed easily in wireless networks due to the unsupervised access to the wireless medium. The malicious manipulation of routing messages results in the dissemination of incorrect routing information...
The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header. Computer simulation shows that in comparison to the original ad hoc on demand distance vector (AODV) routing scheme, the...
Rushing attacks in mobile ad hoc networks (MANETs) cause system resources to become scarce and isolates legitimate users from the network. Therefore, this sort of attack significantly influences network connectivity and weakens networking functions and capabilities such as control and message delivery. This paper will focus on rushing attack which threatens the security of the mobile ad hoc network...
A mobile ad-hoc network (MANET) can be described as a mobile wireless network, consisting of a collection of communication nodes, which have to interact among themselves without the use of any centralized authority or fixed infrastructure. There are several technical challenges regarding deployment of a MANET, such as network scalability, communication stability, energy consumption, security and quality...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP...
An ad hoc network is a collection of computers (nodes)that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use demanding applications such as Voice over IP, videoconferencing, and streaming media when they are connected through an ad hoc network. Because over provisioning, a common technique in wired networks, is often impractical in...
Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop scenario and resource constraint. An ad hoc node in mobile ad hoc networks operates as not only end terminal but also as an intermediate router. In this way, multi-hop scenario occurs in MANETs. This multi hop scenario demands...
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. Two on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol and DSR (Dynamic Source Routing) protocol. The security of the AODV protocol is compromised by a particular of attack called ??Black Hole?? attack...
A Mobile Ad-hoc NETwork (MANET) is a wireless network set up temporarily without a wired infrastructure (routers, switches, servers, cables, access points, etc.). The wireless nodes in a MANET may move around and each one of them may need to forward packets for other components in the network. Several routing protocols such as DSR, AODV and DSDV have been proposed to facilitate communication in such...
Ad hoc network is particularly vulnerable due to the lack of any centralized infrastructure. However, the typical on-demand routing protocols for ad hoc networks such as AODV and DSR have no security considerations and trust all the participants to correctly forward routing and data traffic. In this paper, the foundational conception of ad hoc networks and the routing attacks in them are introduced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.