The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An efficient authenticating mobile user protocol for wireless communications was proposed in this paper. The most important feature of our proposed protocol has the property of authenticating mobile user. In this scheme, the mobile stations must be authenticated by visit network. We use the pre-computing, unbalanced technique in which mobile stations have far less computational and communication requirements...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
The recent proliferation of wireless devices extends the scope of mobile ad hoc networks (MANETs) applications beyond the military domain to include civil and commercial application scenarios. Since MANETs are composed of mobile terminals with limited resources, MANET security remains an unsolved and motivating challenge. Due to advantageous like in-frastructureless and spontaneous deployments, MANETs...
The following topics are dealt with: neural networks; equalisation; mobile and cellular communications; optical communications; data security; human factors in communications; coding and modulation; optical networks; database and optimisation; time-frequency analysis; computer vision and recognition; audio and speech processing; wireless networks; watermarking; digital filters; network coding and...
This work presents a new mechanism for securing mobile ad hoc domain. Some human immune features and properties have been motivated in an attempt to build a robust security system. New computational techniques have been developed based on the immune system concepts, seeking to solve several engineering problems; however, not all the previous approaches have a tangible contribution to the networking...
In this paper we have introduced a geographic rendezvous application through SMS Pushing (GRASP), a novel push based location based application. This enables a person to know whether any of his/her friends or colleagues, specified by the requesting user is present at a particular place also specified by the requesting user. The system also enables the service user to specify a future date and time...
On the road and during tactical maneuvers, the Blue Force must maintain situational awareness to effectively react and respond. The Tactical Network, or TacNet, is a mobile ad hoc communications network developed by Sandia National Laboratories to provide Blue Force personnel with secure access to critical data, such as real-time maps of resource positions. During development of the system, the Sandia...
In this paper, a smart strategy of quality enhancement and control for wireless multimedia communication is proposed. Via hiding the watermark information into each subband of the original media, channel condition can be estimated at the mobile terminal by simple watermark parity check. Once the channel condition of each frequency subband is known, the dynamic bit allocation strategy is adopted accordingly...
Admission control is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology and to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted authority. An ideal admission protocol must involve minimal interaction...
In this paper we propose an efficient key agreement protocol suite for heterogeneous mobile ad-hoc groups, whose members use mobile devices with different performance limitations, e.g., laptops, PDAs, and mobile phones. Absence of a trusted central authority in ad-hoc groups requires contributory computation of the group key by interacting members. We introduce a performance ratio parameter to quantify...
Numerous schemes have been proposed for secure routing and intrusion detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent intrusion detection system (IDS) for ad hoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.