The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad-hoc networks are collection of self-organized, autonomous nodes (routers) and capable to communicate directly with neighbors' node through broadcast packet in within transmission range. Ad hoc network has a primary concern to provide protected communication between mobile nodes. In transmission channel, nodes can be a malicious node and compromise or breaches service, which makes security extremely...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
Wireless communication faces several security risks. An attacker can easily inject bogus packets, impersonating another sender. We refer to this attack as a spoofing attack. An attacker can also easily eavesdrop on communication record packets, and replay the (potentially altered) packets. In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing...
In this paper, we propose a novel intrusion detection (ID) method, distributed court system (DCS), that is applied on OLSR (optimized link state routing) protocol in mobile ad hoc networks (MANETs), to solve link spoofing in topology control (TC) messages. This system performs similar functions as a court in real-life. Network is organized into one-hop clusters, in which each node performs local monitoring,...
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
Trust is an important issue when a wireless sensor network is used in the fields such as military surveillance and reconnaissance, emergency rescue, and intelligent residential district. Due to the restrictions of energy, resource, and computing power in the sensor nodes, the traditional secure solutions cannot be applied to the wireless sensor networks directly. In this paper, applying the concept...
In previous work, we proposed a ??Bootstrap?? protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of this Bootstrap protocol, striving to answer the following questions: 1) To what extent can an adversary undermine the correctness and performance of the...
In vehicular ad hoc networks (VANETs), the malicious messages and tampered messages threat other drivers' life or confuse the traffic order possibly. The anonymity has to be traceable when the law enforcement authority wants to figure out the accountabilities about the anonymity. We describe the problem that characterizes the privacy of VANETs and proposes a new anonymous key mechanism with a system...
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network,...
In this paper, we propose a new Dynamic Reputation Evaluation Model (DREM) to meet the requirement of characteristics and security in hierarchical Ad Hoc networks. In this model, the reputation relationship is defined with the consideration of related node roles and functions, and the reputation evaluation mechanism is built based on the correlation among nodes to evaluate and update the reputation...
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption...
Building trust has been recognized as a new security approach for wireless distributed networks. In the paper, we try to provide a completely new view by building trust territory in ad hoc networks. The concept of trust territory is addressed and the approach to build trust territory is also discussed. A trust territory contains all nodes trusted by the node. It is considered secure to communicate...
Trust is one of the basic assumptions that we use in every day life. In ad hoc networks, routing protocols implement trust implicitly between the nodes of the network. Unfortunately, the implicit trust relations are not used by nodes whereas the attacks on ad hoc routing protocols precisely lead to the violation of at least one of these trust relations.In this paper, we demonstrate that a node can...
Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal...
In this paper, we propose a location-release signature scheme based on bilinear pairings for vehicular ad hoc networks (VANETs). Location-release signature is a capsule signature signed by a source location server that becomes valid after the signature arrives at a specific destination location, where a location server publishes some trapdoor information associated with such a destination location...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
A fair non-repudiation security protocol can provide non-repudiation proof for two parts of the exchange at the same time, or both get nothing. But many protocols performed weak in logical analysis. In this paper, a group of new protocols(with 3 sub-protocols) with off-line The Third Party(TTP) are presented. We analysis them with a new Kailar logic analytical method. Finally, the proposed protocols...
The following topics are dealt with: data mining; genetic algorithm; software engineering; Web applications; information management; data management; wireless networks; databases; neural networks; ad hoc networks; real time systems; social network; security; multimedia; multi-agent system; artificial intelligence; distributed systems; parallel systems.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.