The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad hoc networks (MANET) are self-configured and self-maintained network without any central authority. In MANET the route discovery from source node to destination node is a critical issue due to frequent changes in network topology and mobility of nodes. The MANET consists of problems such as load balancing, scalability, stability, reliability security and robustness. It is therefore necessary...
Mobile ad hoc networks proved their efficiency in the deployment for different fields, but highly vulnerable to security attacks. It seems to be more challenging of in wireless networks. Existing research carried out provides authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Ad hoc network characteristics should be taken into consideration to...
Secure routing protocol attracts much more attention in mobile ad hoc networks for the purposes of secure data transmission. But the improvement of security often sacrifices the delivery rate or other QoS. We propose a secure routing protocol by integrating multipath routing and secret sharing, meanwhile, select efficient and secure multiple disjoint routes by integrating multiple metrics including...
It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad...
The specific characteristics of Mobile Ad Hoc Networks (MANETs) make secure transmission important issues in its research. In this paper, we present a scheme using soft encryption combined with multipath routing to provide security of data transmission over MANETs. In the scheme, the messages are divided into different parts and encrypted by simple operations such as XOR function and bits rearrangement...
Mobile ad-hoc network (MANET) is an appealing technology that has attracted lots of research efforts. Due to frequent communication failures, multipath routing is preferred than single-path routing in many applications such as multimedia streaming over MANET as the former can provide robustness, load balancing and reduce end-to-end delay. However, a security remains important factor that hinders the...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
With the increasing demand of ubiquitous computing, the interconnection of mobile ad hoc networks (MANETs) to Internet is also getting attractive, which is so-called hybrid or connected MANET. In MANET paradigm, routing is a challenging task due to mobility and the resulting inherent dynamic network topology. In many applications, multipath routing scheme is favorable than single-path routing due...
In mobile ad hoc networks (MANETs), multihop transmissions rely on nodes collaboration to correctly route and forward packets to their final destination. However, collaboration of intermediate nodes is not guaranteed and non-collaborative nodes may drop packets they are asked to forward. Such behaviour, known as packet dropping, results of nodespsila selfishness or maliciousness and has dramatic effects...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.