The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
This paper specifies and focuses on a scheme for manage the authorized nodes after distribute and manage the keys for group in ad-hoc environment i.e. the rejoining of authorized nodes in any cause of failure for acceptance of new key from the round leader. It is applied to the Secure OLSR Protocol. This problem loses the group management efficiency. The overall objective of this paper is to make...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
Wireless data communications commonly use public networks to exchange data packets. Public networks of rural area are lack of network infrastructure so it will inflict high delay for wireless communications. The rural areas are same with intermittent area that need a mechanism of data transfer to tolerate with delay. The Delay Tolerant Network (DTN) is a solution for data transmission in rural areas...
In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search...
Node Security is very important because there are many kinds of node behavior coexisting in an unknown network. Most of node trust evaluation existing is based on energy element and communication element, which is not sufficient to describe behavior security of a node. This paper evaluates node trust value by the node behavior effect on network security. It presents behavior cognition parameters and...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
Mobile Ad-hoc networks (MANETs) are self-organizing multi-hop wireless networks composed of independent mobile nodes. Due to the characteristics of dynamic topology and limited resources, MANETs are vulnerable to attacks from malicious nodes. However, traditional security policies with encryption and authentication cannot be well suited for MANETs, because of absence of trusted third party. In order...
To detect and isolate the misbehaving nodes in MANETs, reputation-based security schemes have been developed. These schemes either utilize only first-hand (direct) information or both first-hand and second-hand (direct) information, to compute the trustworthiness of nodes. Both of the aforementioned categories have their own strengths and weaknesses under different network conditions and scenarios...
Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing...
Mobile Ad-hoc Network (MANET) is decentralized infrastructure less wireless network with self configuring dynamic nodes. Routing functionality is carried by nodes with the help of routing protocols for effective communication among them. Since routing protocols are major player in network, the intruders target these protocols. One such repudiation attack is Flooding attack. In flooding attack, malicious...
Due to their rapid evolution, mobile devices demand for more dynamic and flexible networking services. A major challenges of future mobile networks is the increased mobile traffic. With the recent upcoming technologies of network programmability like Software-Defined Network (SDN), it may be integrated to create a new communication platform for Internet of Things (IoT). In this work, we present how...
The paper presents a brief overview of routing protocols in wireless ad-hoc networks. The main focus is on solving security issues. We conclude that the concept of trust is fundamental in the design of secure routing protocols today. Based on SAR (Security-Aware Ad-hoc Routing) protocol, we propose a role-based approach to secure routing. This approach enhances the flexibility and security of information...
Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication...
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become...
UAV Ad hoc Network (UAANET) is a wireless ad hoc network composed of Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS). Compared to the standard Mobile Ad hoc NETworks (MANETs), the UAANET architecture has some specific features that brings exciting challenges to communication architecture design. One of them is the design challenge of a UAANET routing protocols. It must find an accurate...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.