Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Network coding is a new paradigm that provides possibility to maximize network throughput, decrease power consumption, and increase reliability. Forwarder nodes in network coding system receive input packets and mix them to generate output packets. Because of mixing nature of network coding packets, these systems are vulnerable to pollution attacks, in which attacker can inject polluted packets into...
Modeling and computing trust in distributed computing systems like ad-hoc networks is very much challenging. Particularly in Wireless Sensor Networks (WSNs), where the network is formed and self-organized by relying on the almost strangers for reliable and normal operation, it is important to compute the trustworthiness of individual nodes in distributed manner. In order to find the trustworthiness...
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional...
Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts...
In mobile ad hoc networks, the security enforcement and its implementation becoming increasingly difficult due to quasi-static nature of the mobile nodes (wireless communication devices), no fixed network topology and more importantly absence of centralized authority. In such networks, communication links between nodes may be bandwidth constrained, messages typically roamed in multi-hoped fashion,...
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sensor nodes, cluster heads and a base station arranged hierarchically. The framework encompasses schemes for establishing and managing trust between these different entities. We demonstrate that the proposed...
A Security Association (SA), established by strong authentication, between a node pair in a Mobile Ad hoc Network (MANET) could be lost when its route is disconnected. In contrast, in good channel conditions and stable topology, routing protocols such as the Optimized Link State Routing (OLSR) do not refresh routes periodically, and in doing so, an SA bound to these routes could become stale and out...
Routing in mobile ad-hoc networks is a challenging task. This paper proposes MPG-TAR, trust-aware routing protocol based on the formation of trusted Mobile Process groups(MPG). MPG is a collection of processes or mobile nodes present in defined vicinity where they all lie within each other's radio transmission range. The trusted MPG groups formed in MPGTAR calculate trust based on the mobility rate,...
Ad hoc network is flexibly formed by a group of peer nodes and depends on the irresponsible cooperation among them, so it is vulnerable to various attacks. Thus, trust is introduced to promote nodes to transmit messages. Nodes with higher trust values are more easily selected for transmission which results in unbalanced load distribution. Therefore, packets from different sources are more likely to...
Trust has been recently suggested as an effective security mechanism for wireless sensor networks (WSNs). In this paper, we propose an energy prediction based trust management that not only prevents the election of compromised or malicious nodes as cluster heads, but also introduce novel vice-head nodes to monitor the cluster heads' behaviors in case of their betrayal. Specifically, we employ energy...
The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
Due to its ad hoc, infrastructure-less self-configuring and collaborating nature, wireless sensor networks (WSNs) are very much vulnerable to different security threats. The goal-oriented nature of many sensing applications results in collaboration. In fact, collaboration helps to improve WSNs efficiency as well as the data-centric behavior of WSNs. Collaboration along with its advantages like efficient...
Vehicles will exchange much information in the future in order to efficiently maintain their inner model of the environment. Before they can belief received pieces of information, they must evaluate their reliability. Trust is a mechanism to estimate this reliability based on the sender. As cars often drive the same route, they meet each other again and again. They can establish friendship-like relations...
This paper presents an application of reputation based trust assessment model in mobile ad hoc network setting. A game between the Sender (originator) and Intermediary (forwarder) nodes in the network is modelled and plugged-in to a trust assessment framework that classifies feedback according to past acquaintances between the nodes. Simulations for the experiments have been carried out in an Iterated...
Since Role-Based Access Control (RBAC) shows great advantage in meeting the security need in large-scale and enterprise-wide system, RBAC becomes the hot topic in access control research field. However, current approaches to access control are mostly based on individual user identity; hence they do not scale to distributed systems. So, the paper analyses RBAC could not satisfy dynamic access control...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.