The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low Power and Lossy Networks (LLN) are characterized by stringent energy constraints and frequent communication errors. Recent research in the area of LLNs has focused in solving many issues like security, energy efficiency, and routing. RPL is a new routing protocol proposed for LLNs by IETF ROLL group. RPL provides opportunities for improving overall performance of LLN by providing mechanisms for...
Friendly jamming is a physical layer security technique that utilizes extra available nodes to jam any eavesdroppers. This paper considers the use of additional available nodes as friendly jammers in order to improve the security performance of a route through a wireless area network. One of the unresolved technical challenges is the combining of security metrics with typical service quality metrics...
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things and mainly for the RPL (Routing Protocol for Low-power and Lossy Networks) called: Metric-based RPL Trustworthiness Scheme (MRTS). The primary aim is...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing...
Trust-based secure routing in MANETs has attracted lot of research attention worldwide. It is effective in providing secure routing by isolating malicious nodes and other overheads from MANETs. This paper proposes, GradeTrust, a secure routing protocol for MANETs based on the trust levels of network nodes. It uses trust to isolate black hole routing attacks thus offering secure routing of data traffic...
In this paper, we propose a novel routing protocol by overcoming the security issues of node disjoint multipath routing protocols to ensure the reliability by discovering multiple secure paths. The proposed protocol considers link compromise probabilities to generate multiple routes with low compromise probabilities. Contrary to contemporary distance metric multipath routing protocols, our proposed...
There are numerous environments and situations where network infrastructure is sparse, latent, or partially out of service. There is a growing body of research on protocols, security, information assurance and trust for use in such Resource Constrained Networks. A few examples of a Resource Constrained Network include Delay Tolerant, Wireless Sensor, and many mobile ad-hoc and ad-hoc mesh networks...
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In fact, RPL is facing many issues. Among these issues, trust management is a real challenge when...
Several routing protocols in MANET have been proposed which emphasize on optimal route discovery without considering security. Several trust metrics have been proposed for trust calculation such as packet forwarding rate, receiving rate, packet misrouted and so on. However, they only show their efficiency in static scenarios. To deal with the mobility factor, an attempt has been made to find a suitable...
The use of wireless sensor networks (WSNs) can be advantageous in applications that serve in hostile environments such as security surveillance and military battlefield. The operation of a WSN typically involves collection of sensor measurements at an in-situ Base-Station (BS) that further processes the data and either takes action or reports findings to a remote command center. Thus the BS plays...
The operations of smart metering heavily rely on the communication network for efficient data gathering, thus eliminating manual meter reading. Smart electronic devices are deployed in open, unattended and possibly hostile environment such as consumer's home and office areas, making them particularly vulnerable to physical attacks. Resilience is needed to mitigate such inherent vulnerabilities and...
There is a need for robust and effective trust management. Different security problems result in different requirements to the design of trust management, and the existing attacks in trust management for security are yet to be solved. In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems. We then investigate typical representative...
MANET is the self-organized and distributed system with no central administration and requires no infrastructure. Due to this, the MANET is used in emergency services and during natural calamities. Nodes have to co-operate with each other for routing packets. Security is the major challenge for these networks. The compromised node can adversely affect the quality and reliability of data. To improve...
This paper proposes and subsequently delineates quantification of network security metrics using software defined networking approach in real time using a progressive testbed. This comprehensive testbed implements computation of trust values which lend sentient decision making qualities to the participant nodes in a network and fortify it against threats like blackhole and flooding attacks. AODV and...
Community wireless mesh networks are decentralized and cooperative structures with participation rules that define their freedom, openness and neutrality. The operation of these networks require routing algorithms that may impose additional unnecessary technical restrictions in the determination of routes that can restrict the freedom of community users. We propose a receiver-driven discretionary...
Little effort has been made to compare routing protocols according to their resiliency in wireless multi-hop sensor networks in the presence of packet dropping malicious insiders. In this paper, we propose a new taxonomy of routing protocols obtained by applying our resiliency metric. Several resiliency enhancing methods such as introducing a random behavior to the classical routing protocols and...
In this paper, a series of novel secure dynamic routing protocols are proposed to provide the end-to-end security. Unlike the existing dynamic routing protocols with security consideration which focus on a certain specific network threat, in the paper the proposed approach is based on a comprehensive network security evaluation framework. By analyzing the threats, vulnerabilities, countermeasures,...
This paper describes the need for a unified simulation framework which defines the simulation tools and configuration settings for researchers to perform comparative simulations and test the performance of security tools for the AODV MANET routing protocol. The key objectives of the proposed framework are to provide an unbiased, repeatable simulation environment which collects all important performance...
Decentralized Online Social Networks (OSNs) attempt to improve user privacy and security. One example is Vegas, a Peer-to-Peer (P2P) OSN which attempts to bring its users back into complete control of the data they share. Due to its decentralized characteristics, P2P OSNs cannot support social search functions in the same way users of centralized OSNs like Facebook are familiar with. Well-known and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.