The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Delay/Disruption Tolerant Network (DTN) is characterized with intermittently connectivity and frequent partitions. Due to this, the DTN routing algorithm is very vulnerable to various kinds of malicious attacks. In this paper, combined with many other DTN forwarding approaches, we propose a multi-stage routing forwarding algorithm so as to further improve network throughput. To ensure the security...
The security routing protocol for Multi-Input-Multi-Output Vehicular Ad-hoc Network (MIMO-VANET) which is used to prevent the eavesdropping in VANET was presented in this paper. When building the routing table, this protocol stores the current channel states and restricts the VANET nodes, excepted source/ destination nodes, from obtaining the unrelated routing information. During the information transmission...
The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we...
Network coding (NC) has frequently been promoted as an approach for improving throughput in wireless networks. Existing work has mostly focused on the fundamental aspects of NC, while constraints arising in real-world network deployments have not received much attention. In particular, NC requires network nodes to overhear each other's packets, which oftentimes contradicts many security standards...
We consider the problem of securing a multicast network against a wiretapper that can eavesdrop on the packets on a limited number of network edges of its choice. We assume that the network employs network coding to simultaneously deliver the packets available at the source to all the destinations. We show that this problem can be looked at as a network generalization of the wiretap channel of type...
Many routing protocols have been proposed for wireless sensor networks (WSNs). However, only few of them addressed secure routing. This work contributes in solving secure and reliable routing problems by presenting a secure and reliable multipath routing protocol (MSR) for WSNs. MSR consists of three key components: on-demand multipath routing, enhanced passive acknowledgment, and erasure coding....
Network Coding is an information exchange technology. It combines with coding and routing, based on traditional storing and forwarding routing method, it allows mixing the multiple received packets together to increase the amount of information in a single transmission, which can improve the performance of the overall network. Unreliability of wireless links and the broadcast nature of the physical...
Security in mobile ad hoc networks (MANET) Quality of Services routing has received increased attention in recent years. This paper proposes mechanism to obtain secure MANET QoS routing with regard to QoS considerations. Our goal is to present a new mechanism over on-demand multi-path routing protocol (AOMDV) that tackles the twin issues of reliability (protection against failures of multiple paths)...
Multicast routing is very important for wireless sensor and actor networks (WSANs), where the decisions or control information from actors will be delivered to sensors over each link of the WSANs only once. In the multicast route each copy should be securely send to the authenticated destinations. The relay nodes should compute and identify forwarding paths to meet packet's security requirement. This...
In the anonymous communication mechanisms based on key infrastructure, public key or pre-shared key are widely used to set up relay paths and negotiate shared keys in session. Therefore, these systems always have complicated architecture and high key management cost. However, key infrastructure is hard to deployed in distributed environment. Based on multi-paths network coding, this paper firstly...
Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. A store-and-forward network architecture known as the disruption tolerant network (DTN) has been designed for such challenging network environments. To further improve the delivery performance, some researchers have proposed some network coding schemes for DTNs. However, not much papers discuss the...
Autonomic networks are networks that are self- organized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure and reliable message transmissions in autonomic networks. Because of the mobility and dynamics, trust management in autonomic networks is a much more dynamic problem than in traditional server-based networks. In traditional networks,...
Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide...
Due to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications (Pay-TV,Banking, Telecommunication ...), a high level of security is needed. FPGAs are intrinsically sensitive to ionizing effects, such as light stimulation, and attackers can try to exploit faults injected in the downloaded configuration. Previous...
Cryptographic devices are recently implemented with different countermeasures against side channel attacks and fault analysis. Moreover, some usual testing techniques, such as scan chains, are not allowed or restricted for security requirements. In this paper, we analyze the impact that error detecting schemes have on the testability of an implementation of the advanced encryption standard, in particular...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.