The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been proposed to mitigate the black hole attack using AOMDV (Ad hoc on Demand Multipath Distance Vector) routing protocol. Some improvements have been made in AOMDV protocol. These improvements...
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
Mobile Ad-Hoc Network (MANET) is an emerging area with practical applications. An Ad-Hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. However, routing security in MANETs appears to be a problem due to open medium, dynamic topology and constrained capability. The proposed work estimates the applicability...
Multipath routing in adhoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. The multipath routing along with SDMP and WEP to allow the receiver to reconstitute the original message in the correct order. So fault tolerance problem can also use...
In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because attackers can freely move and repeatedly launch attacks against different nodes. By adopting certification systems, it becomes possible to exclude identified attackers from the network permanently by revoking the certifications of the attackers. A simple way to identify attackers...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors; however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
In this paper, a security architecture is designed based on the artificial immune system by using multi-agents in mobile ad hoc networks. There are two types of immunity-based agents: one is detection agent and the other is counterattack agent. Detection agents take charge of monitoring the nodes in the network, detecting the anomaly activities, and taking response to the invader, which may be viewed...
The pervasive nature of wireless devices and the arbitrary organization of mobile networks attract growing interest in the design of wireless and mobile ad hoc networks. However, malicious nodes always exist due to the vulnerabilities of wireless and mobile nodes and thereby their misbehavior can weaken the utilization of ad hoc networks. Therefore, addressing security issues becomes extremely important...
Secure dynamic IP addressing is a prime requirement for unicast communication between authorized hosts in mobile ad hoc networks. Recently, several approaches have been proposed for dynamic addressing scheme. However, most of the approach rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can...
Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions...
In this paper, we propose an anonymous protocol to secure nodes which have important roles in the network. We focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each cluster, a confident node is selected to ensure the certification authority (CA) roles; however, the cluster security depends in the security of the CA node. Therefore, we present an anonymous dynamic demilitarized...
In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Therefore,the cooperation of nodes is very important. With lack of a prior trust relationship, misbehavior caused by selfishness or malice may severely degrade the performance of the network. The cooperative security schemes offer a reasonable effective solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.