The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
The border region monitoring task can be achieved using surveillance wireless sensor networks. The network detects trespassers and inform the sink node. There are many mobility models proposed for users within an ad hoc network. On the other hand, the behavior of trespassers are generally different than mobile users and does not follow a random pattern. Observations from previous security related...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Mobile devices act as hosts and routers in Mobile Ad-hoc Networks with no designed infrastructure. The enormous increase in MANETs provides the evolution of various solutions from wired to wireless to Mobile Ad-hoc Networks. The security has been the key in any communication implementation. The security implementation in MANET is a challenging and not considered much for research. In this work we...
The recent proliferation of wireless devices extends the scope of mobile ad hoc networks (MANETs) applications beyond the military domain to include civil and commercial application scenarios. Since MANETs are composed of mobile terminals with limited resources, MANET security remains an unsolved and motivating challenge. Due to advantageous like in-frastructureless and spontaneous deployments, MANETs...
Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety...
This work presents a new mechanism for securing mobile ad hoc domain. Some human immune features and properties have been motivated in an attempt to build a robust security system. New computational techniques have been developed based on the immune system concepts, seeking to solve several engineering problems; however, not all the previous approaches have a tangible contribution to the networking...
Ad-hoc networks have a promising future in network area. It is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are not known in wired networks. Out of these threats, impersonation attack is the most terrific and unavoidable, that can collapse the entire network...
Although static sensor nodes have low computation and communication capabilities, they have specific properties, and can acquire stable neighboring nodespsila information, which can be used for detection of anomalies in networking and behaviors of the neighbor nodes, thus providing security for wireless sensor networks. In many attacks against sensor networks, the first step for an attacker is to...
The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized authorities. In this work, we are focusing on the evaluation of trustworthiness between two strangers in large, dynamic ad hoc networks. This novel evaluation process is modeled as a common...
Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of admission and revocation of ad hoc nodes. In this paper, we present ID-NAC, identity-based network access control for MANETs. In ID-NAC each node in the network maintains a profile...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
MANET has been a hot research topic for quite a few years. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. Applications for MANET range from military operations and emergency disaster relief, to community networking and interaction between attendees at a meeting. The challenge of MANETs is to design...
This paper investigates the key elements for a scalable solution of authentication, authorization, and accounting for service delivery in vehicular networks. Different approaches were studied to identify their advantages and disadvantages according to main evaluation parameters, two of which are scalability and latency. Upcoming research efforts need to address these elements to provide an appropriate...
This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured...
Ad-hoc networks, due to their improvised nature, are frequently established in insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. Ad-hoc on-demand distance vector (AODV) is one of the widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.