The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An improvisation version of traditional wireless networks provide mobile ad hoc network (MANET), which is highly suitable for emergency needs. But, at the same time, due to its infrastructure less and resources limitation create many challenges in its performance. Mainly due to its dynamic behaviour it prones to high security concern, as the complete communication cycle depends on the independent...
Mobile ad hoc networks (MANETs) are widely used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This general characteristic of MANET has rendered it susceptible to security attacks. The black hole attack is a well known severely occurring security threat in wireless mobile ad hoc networks. A black hole is a malicious...
MANET is a continuously self-configuring, infrastructure less networks consisting of mobile devices which are connected by no any wired connection. Mobile devices are always in moving state. While transmission of data from one node to another the nodes establish a path with the help of intermediate nodes. Due to the mobility of nodes in the network the malicious nodes can be easily introduced in the...
In the absence of centralized trusted authorities (CTA), security is one of the foremost concern in Mobile Ad-hoc Networks (MANET) as the network is open to attacks and unreliability in the presence of malicious nodes (devices). With increasing demand of interactions among nodes, trust based information sharing needs more stringent rules to ensure security in this pervasive computing scenario. In...
The paper presents an approach of the design optimization for the TAFHNET model, including cognitive features, with the focus on a secure (anonymous) routing algorithm (SECRAL). The SECRAL is offering a simpler solution with an alternative original mathematical model, aiming a balance between the highest security and the complexity cost and including scalable additional cognitive information (ACI)...
A node in an ad hoc network is accountable for routing the packets to neighboring nodes. This evolves trust factor among nodes on the basis of which packets are forwarded to other nodes if it is trusted and thereby furnishes a secure & reliable communication. This trust can be defined by several approaches which are based on node's behaviour, monitoring, reputation etc. In this paper, an approach...
The lookup mechanism used to locate services in Peer-to-Peer systems can be attacked with little effort due to its decentralized and self-organizing nature. Security mechanisms aiming at rendering the lookup mechanism more robust mostly require a high amount of network resources. These mechanisms cannot be applied without adaptations when network resources are limited. In this paper, we introduce...
MANET is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. Each node in this network relays its neighbors for routing and message forwarding. Cooperation between nodes should be established without any centralized authority. However, neighbor based communication without any trust worthiness creates a major...
In this paper, we analyze the effect of intrusion detection system (IDS) techniques on failure time of a mission-oriented group communication system consisting of mobile groups set out for mission execution in mobile ad hoc networks. Unlike the common belief that IDS should be executed as often as possible to cope with insider attacks to prolong the system lifetime, we discover that IDS should be...
We develop a class of adaptive security protocols with designs to allow group communication systems (GCSs) in mobile ad hoc networks (MANETs) to dynamically adjust operational settings to best satisfy application-imposed performance and security requirements, leveraging the inherent tradeoff between security and performance properties of the system. These adaptive security protocols include an intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.