The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Prevalent concerns with dynamic networks typically involve security. Especially with resource constraints in dynamic networks such as mobile ad-hoc networks (MANETs), security needs to be of particular consideration. In this paper, we first analyze the solution concept involved in optimizing resource allocation and data packet forwarding. In a MANET, the availability of having data packets forwarded...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
In current research self-security management is of high interest. Wireless Ad hoc networks use mobile nodes to enable communication outside wireless communication zone. Attacks on wireless ad hoc network routing protocols disrupt network performance and reliability. In active black hole attacks on wireless networks; malicious nodes advertise the shortest path through the, between source and destination,...
In mobile ad hoc networks the nodes are dynamically changing and they have a fully decentralized topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmissions medium. We proposed a novel agent based framework to monitor, detect, and isolate misbehaving nodes in...
Adhoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network are responsible for management activities. In multihop adhoc environment, it is difficult to maintain paths through intermediate nodes, due to the mobility of nodes, nature of radio transmission etc. In the absence of an authentication mechanism, malicious nodes can easily corrupt route tables,...
Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. Similar to most security schemes, trust establishment methods themselves can be vulnerable to attacks. In this article we investigate the benefits of introducing trust into distributed networks, the vulnerabilities in trust establishment methods,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.