The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
MANETs are an upcoming technology that is gaining momentum in recent years. Due to their unique characteristics, MANETs are suffering from wide range of security attacks. Wormhole is a common security issue encounter in MANETs routing protocol. A new routing protocol naming extended prime product number (EPPN) based on the hop count model is proposed in this article. Here hop count between source...
Data transfer rate is more in wireless network as compared to wired network. Wireless network gives more advantageous because its support feature such as versatility, portability, open medium, simple to design. MANETs and WSN are the most common forms of Wireless media. In MANETs nodes are deployed or distributed in Ad-hoc way and they are communicating or exchange message using wireless Transmission...
The MANETs (Mobile Ad Hoc Networks) are increasing on popularity due to their dynamic nature, minimal infrastructure requirements, deployment cost and their self-configuring attributes. Advances in low power computing and communications and increase of transfer rates makes MANETs even more desired in different real world applications. These properties make them ideal for employment in tactical military...
Wireless networks are highly demanding due to its features, like flexibility and scalability. Among all the available wireless networks, MANET has the dynamic topology and it does not have the fixed network infrastructure. Each node acts as the transmitter along with the router. The nodes can communicate with each other either directly or with the help of neighbors. MANET is easily vulnerable to attack...
MANETs is a collection of mobile nodes. There infrastructure is neither fixed nor has any control station. So it is affected by various types of malicious attack. AODV is a standard MANETs protocol so every malicious node tries to attack on this routing protocol. A black hole attack is a type of malicious attack in which black hole node replies to route request packet with the highest destination...
Secure and reliable communication is very important for a lot of different use cases. One major area of application is Network Enabled Capabilities (NEC). Security and reliability are even harder to achieve for the tactical domain, when different nations with a variety of communication technologies have to form a heterogeneous ad hoc network. CoNSIS (Coalition Networks for Secure Information Sharing)...
MANETs are normally used in applications which are highly confidential in nature, such as defense, disaster management, etc. Secure data transmission is one of the challenging issues in MANET. Secret sharing has been one of the popular techniques for implementing security in MANETs. The existing logics for securing the packet delivery seem to involve too many control signal interchanges. This paper...
Cognitive radio (CR) networks are becoming an increasingly important part of the wireless networking landscape due to the ever-increasing scarcity of spectrum resources throughout the world. Nowadays CR media is becoming popular wireless communication media for disaster recovery communication network. Although the operational aspects of CR are being explored vigorously, its security aspects have gained...
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing in mobile ad hoc networks. In order to intrude into routing path, attacker always deceiving others that it has the shortest path to the destination. Once the attacker successfully intrudes into routing path, it can disrupt all data transmission. Most of the existing defense schemes...
MANET consists of the number of mobile nodes that form a wireless communication. MANETs are self configuring network where the nodes can move freely and randomly. It can dynamically join the network and leave the network at any time. It is widely used in industrial and commercial applications like vehicular communication, agricultural needs and disaster management, etc. There are studies based on...
A wireless sensor network consists of geologically distributed autonomous sensors to monitor and control over physical or environmental conditions, like temperature, sound, pressure etc. And this information is passed through sensors in the network to a next location. Military applications was required the development of security in wireless sensor networks. Today such networks are used in many areas...
MANETs are a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to the flexibility provided by their dynamic infrastructure MANETs are vulnerable to many types of security attacks. Furthermore, many conventional security solutions have been developed...
The secure dispersed data transfer method has been proposed to counter compromise of data packets on relaying nodes. The method requires multiple paths. If the multiple paths are node-disjoint, the secure dispersed data transfer method can generate the smallest number of encrypted data. While SRIDR is the self-organized multipath routing method that generates a smaller number of control packets, it...
This paper shows how to use a well defined set of self-organizing services for establishing and preserving a confidential and adaptive channel between two communicating entities on top of an ad-hoc mobile network.
A new method for data transferring with a secure routing algorithm in Ad-hoc networks is presented. The area of the network is divided into several segments and according to the performance of the nodes, one of them is chosen as the manager of the segment. A public and a private key are dedicated to each segment. The private key is only disposable to the manager of each segment. When a packet is sent...
Conventional network protocols and its security mechanisms fail to cope with arising challenges in trust. Well known concepts from the domain of Trusted Computing can be applied to the example of mobile ad-hoc networks (MANETs) in order to establish extended trust capabilities between devices. The approach of such an anchor of trust in MANETs shows interesting possibilities since no central instances...
USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.