The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability...
Wireless sensor network (WSN) considered as one of the important technology in our days. Low-cost, low-power and multifunction based on these characteristics WSN become more and more apply in many areas. However, one of the major challenges in WSN is the security. Indeed, the usual method of security cannot be applied in WSN because the technological limit of the different components. In this context,...
This paper specifies and focuses on a scheme for manage the authorized nodes after distribute and manage the keys for group in ad-hoc environment i.e. the rejoining of authorized nodes in any cause of failure for acceptance of new key from the round leader. It is applied to the Secure OLSR Protocol. This problem loses the group management efficiency. The overall objective of this paper is to make...
Inside MANET, mobile devices can move independently devoid of pre established infrastructure. In this type of network there is no fixed topology for the network. To increase the coverage range and to obtain the global type of services these MANETs can be joined to other type of networks. For combination of heterogeneous type of networks, intermediate one which is a gateway is used to form a hybrid...
Wireless Mesh Network is an emerging technology with great potential to become a Self-Sustained Network. Unlike the traditional networks that dominate the current communication system and rely on a large and expensive setup of wired/wireless access points to provide connection between users, the Wireless Mesh Network is formed by the user devices (referred as Nodes) which connect to each other to...
Privacy is considered as one of the hottest issues in nowadays communication research areas. It focuses on protecting the content of the transmitted data and on preserving the contextual information such as the identity of the communicating entities. This paper presents an overview of research done in this area in order to build a foundation that helps the research community to understand more the...
Wireless Communication is an inevitable part of Smart Home domain. A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET suffers from both kinds of attacks, active and passive attacks at all the layers of the network model. The lacks of security measures of routing protocols allow attackers to intrude the...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
Opportunistic Routing (OR) protocols are known as a promising research area with the aim of delivering data packets to their destination more reliably. Security of such protocols, however, is still an open, and challenging research problem. In this paper, we propose an enhancement on OR protocols which benefits from an appropriate candidate coordination mechanism, and assists in salvaging data packets...
Anonymous communications are growing extremely fast because more and more Internet users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view. Different studies have shown important design flaws in these systems that could break users' anonymity and how these...
Enhancing road safety is the main goal of Vehicular Adhoc Networks (VANETs). However, the assumption that all peers are honest, cooperative can lead to catastrophic situations. To deal with such misbehaving peers, trust establishment can be used to enhance the security without affecting network performance. In this paper, we propose an opportunistic alert dissemination mechanism based on the trust...
Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network...
Routing in open and decentralized networks relies on cooperation despite the participation of unknown nodes and node administrators pursuing heterogeneous trust and security goals. Living use cases for such environments are given by communitymesh networks due to their open structure and decentralized management and ownership. However, despite many active work in the field of routing security for mesh...
A Mobile Ad-Hoc Network (MANET) is a dynamic ad hoc network without any fixed infrastructure. Since it is dynamic in nature, it can configure and vary locations by itself, on the move. Since devices in a MANET are autonomous and can move in any direction, they change links with other devices very often. One of the principal challenges in building a MANET is to properly route traffic in order to constantly...
VANETs are a kind of adhoc wireless network, which is characterised as restricted topology patterns, node mobility and dynamic in nature. Vehicles communicate with each other via Vehicle-to-Vehicle (V-to-V), Vehicle to roadside unit (RSU) and RSU to Base-Station. Every vehicle is equiped with on board unit (OBU) that helps to communicate with RSU and Base-Station. Routing is very important in communication...
A Mobile ad Hoc Network is a collection of nodes which is an infrastructure less network and hence can be easily established and deployed instantly. In addition to their normal operation, all the nodes in this kind of network act as routers as well. Because of the mobility and dynamic nature of the network, all the nodes are free to move randomly and hence topology of a MANET changes very frequently...
Wireless networks have an important role for development and simply use in human society. In order to categorization of applications, MANETs give a unique range for monitoring and surveillance. MANETs is used to deploy into distant areas for sensing and processing desired information. Due to distributed and open nature of MANET, it is vulnerable and occupied for attacked to intercept and despoil network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.