The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
These are the networks which are formed by Mobile hand held devices like cell phones, laptops etc. Nodes in these networks are mobile in nature. Mobile adhoc networks are very useful in the situations such as military operations, disaster management etc. These networks do not require special additional fixed infrastructure but with the existing infrastructure all mobile nodes can cooperate and reach...
Military networks are required to adapt their access control policies to the Information Operations Condition (INFOCON) levels to minimize the impact of potential malicious activities. Such adaptations must be automated to the extent possible, consistent with mission requirements, and applied network-wide. In this paper, we present a Policy-Based Network Security (PBNS) management approach for tactical...
Mobile devices act as hosts and routers in Mobile Ad-hoc Networks with no designed infrastructure. The enormous increase in MANETs provides the evolution of various solutions from wired to wireless to Mobile Ad-hoc Networks. The security has been the key in any communication implementation. The security implementation in MANET is a challenging and not considered much for research. In this work we...
Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of admission and revocation of ad hoc nodes. In this paper, we present ID-NAC, identity-based network access control for MANETs. In ID-NAC each node in the network maintains a profile...
We investigate the bootstrapping of policy-based access control in a deny-by-default mission-critical MANET. In the absence of any initial policies, a deny-by-default system fundamentally prevents all traffic flow. Providing all policies prior to deployment assumes advanced knowledge of all possible future scenarios - an assumption that is often unrealistic in practice; furthermore, policies may change...
Existing commercial database security products cannot guarantee to provide the same level database security in Mobile Ad-Hoc Networks (MANET) as in wired networks. In this paper, we presented a secure MANET database system that uses metadata and context information for database access control. First, we designed and implemented a context-based security model that uses context factors, such as location...
Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for different applications. We propose a novel hierarchical distributed AAA architecture for proactive link state routing protocols notably OLSR. This proposal contains a lightweight and secure design of an overlay authentication and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.