The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
This paper presents a solution to counter black hole attacks in mobile ad hoc networks (MANETs). Black hole attacks are effective DoS (Denial of Service) attacks committed by fabricating routing information, attracting packets routed through them, and then dropping the packets. The ETX (Expected Transmission Count) metric is a common routing metric in MANETs. It measures the delivery ratio of a wireless...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
GEOGRAPHIC routing protocols use a basic geographic forwarding strategy to forward packets node by nodes toward the location of the destination. This approach to routing has the advantage of eliminating the need for nodes to maintain conventional routing information. One geographic routing protocol named Boundary State Routing protocol which routes the data using the location of nodes. In this paper...
Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
Due to the broadcast nature of wireless transmissions, communications in mobile ad hoc networks (MANETs) are more subject to malicious traffic analysis. In spite of the secure routing protocols, traffic analysis attacks are still not well addressed. Indeed, these protocols focus on security of route maintaining and defending against modification of routing information, which cannot prevent traffic...
Routing is a key factor in the design of modern communication networks, especially in wireless ad-hoc networks (WANs). In WANs, both selfish and malicious nodes are the misbehaving nodes and are significant routing and security problems. The proposed mechanism presents a trust model to detect selfish and malicious nodes to avoid these nodes becoming routing nodes. In addition, the proposed paper provides...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
The following topics are dealt with: wireless systems; wireless LAN; vehicular communication system; digital rights management; ad hoc and sensor networks; routing and QoS; peer-to-peer overlays; security in personalised networks; visible light communications; multimedia communication; content distribution; cellular networks; cognitive radio and wireless home networks.
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save...
The operation of Ad-hoc networks depends on the cooperation among nodes to provide connectivity and communication routes. However, such an ideal situation may not always be achievable in practice. Some nodes may behave maliciously, resulting in degradation of the performance of the network or even disruption of its operation altogether. To mitigate the effect of such nodes and to achieve higher levels...
From the perspective of security of Ad Hoc Networks,a lot of researches have been done on the technology of IBE about mobile communications network, the grouping technology of network, and the evaluation of credit of Ad Hoc network, and attempt to propose a security strategy of a novel Ad Hoc network, which reduces the resource expense of Ad Hoc network. The simulation test indicates that this strategy...
Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. When wireless sensor networks are deployed in a hostile terrain, security becomes extremely important, as they are prone to different types of malicious attacks. Due to the inherent resource limitations of sensor nodes, existing...
An ad-hoc network comprises of mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanism and decision-making. The performance of Ad-hoc On Demand Vector (AODV) protocols has been modified...
A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network. Routing protocols in MANETs define how routes between source and destination nodes are established and maintained. Multicast routing provides a bandwidth-efficient means for supporting group-oriented applications. The increasing demand for such applications coupled...
Multipath routing in adhoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. The multipath routing along with SDMP and WEP to allow the receiver to reconstitute the original message in the correct order. So fault tolerance problem can also use...
Reciprocity-based cooperation on packet forwarding in mobile ad hoc networks means that before passing on a packet to the next hop intermediate nodes verify whether the sender of the packet is trustworthy (i.e., cooperative in the past) or not. One of the key questions is what data should be used to evaluate the trustworthiness. This paper demonstrates that if cooperation is based on indirect reciprocity...
Mobile ad hoc network (MANETs) is an emerging area with practical applications. An ad hoc network is collection of wireless nodes that are capable of communicating in odd situations like geographical disaster rescue and military operations, where either the network infrastructure did not exists or has been collapsed due to catastrophes. The nature of ad hoc network makes them vulnerable to attacks,...
To tackle an inherent security weakness of wireless environments, we propose the implementation of a reputation procedure onto the routing protocol Ad-hoc On Demand Vector routing (AODV). This procedure relies on the overal cooperation of nodes taking part to the Wireless Mesh Network. Each node associates a reputation value to its neighbours, which reflects the trust it puts in them. Based on that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.