The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad Hoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic...
The WirelessHART network is an emerging technology which aims at application in industry. The control network in industry always consists of many end devices and the environment is hash, so the network management of WirelessHART is very critical. This paper first introduced the wireless sensor network management mode and the critical techniques in WirelessHART network. Following that, network management...
Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application areas. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Addressing this challenge in...
In current research self-security management is of high interest. Wireless Ad hoc networks use mobile nodes to enable communication outside wireless communication zone. Attacks on wireless ad hoc network routing protocols disrupt network performance and reliability. In active black hole attacks on wireless networks; malicious nodes advertise the shortest path through the, between source and destination,...
Mobile ad hoc networks are networks of mobile hosts with wireless interfaces that can dynamically form a network without the aid of any pre-existing infrastructure or centralized administration. Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. Security is the one of the major issue in mobile ad hoc network some of the attacks...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
Muli-hop cellular network is a promising network architecture which incorporates the ad hoc characteristic into the cellular system aiming to improve current cellular network performance. Unlike single hop cellular network, due to involving autonomous devices in packet forwarding, routing process suffers from new security challenges which endanger the practical implementation of the network. One security...
Trust establishment in wireless ad hoc networks is a challenge because of its unique characteristics. These include the lack of a central authority and the autonomous, dynamic nature of these networks which result in poor connectivity and routing failure. Security can be provided by a certificate based model but key management is a difficulty in wireless ad hoc networks. A key management scheme is...
Traditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or unprotected environment can seriously affect the protocol and network performance. In this work two kinds of approaches are applied to a well-known routing...
Security is currently a weak point of wireless sensor networks (WSN) impeding their proliferation although they offer flexible and low cost solutions for many every-day life applications. In WNSs, routing of data from the sensor nodes towards the destination/base station relies on the cooperation among neighbouring nodes. The realization of a trust management system which allows each node to define...
Wireless sensor networks are rapidly emerging as an important area in ubiquitous computing industry. They are very tiny devices with limited energy, memory, transmission range, and computation power. So, wireless sensor networks are vulnerable to security attack such as sinkhole attack, wormhole attack, and simple power exhaustion attack. However, wireless sensor networks must be secured from obstructing...
This paper reviews recent experiments with airborne networking, including Bold Quest 2007 and Joint Expeditionary Force Experiments (JEFX) in 2006 and 2008, to examine the different options for building airborne networks given the current state of technology and installed equipment base. This includes combining data between legacy data-links and the IP world of applications, deploying IP applications...
Key management poses a main concern for security operation in sensor network. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and causes large overhead. Recent trend of research mainly consider homogeneous sensor network and a few consider heterogeneous sensor network for key management...
In mobile ad hoc networks (MANETs), multihop transmissions rely on nodes collaboration to correctly route and forward packets to their final destination. However, collaboration of intermediate nodes is not guaranteed and non-collaborative nodes may drop packets they are asked to forward. Such behaviour, known as packet dropping, results of nodespsila selfishness or maliciousness and has dramatic effects...
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In order to circumvent this attack, one person should be able to obtain only a limited set of identifiers and should not be able to choose them. Moreover, due...
This paper will focus on developing fundamentally new methods to design the next generation of wireless networks. The proposed top-down cross-layer approach will address spectrum sharing, medium access, cooperative and adaptive link management, and opportunistic access and information routing. The proposed techniques will enable vast new application areas beyond traditional communications including...
The following topics were dealt with: multiservice networks; Web services; peer-to-peer systems; routing; QoS support and management; service management; congestion and admission control; traffic characterization; ad hoc networks; sensor networks; and security
The following topics are dealt with: optical networks and systems; wireless networks; communication systems; system and traffic modeling; traffic management and scheduling; routing and switching architectures; security
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.