The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to...
Trust Management Frameworks (TMFs) are being used to improve the efficiency, security, and reliability of decentralized and distributed autonomous MANETs using metrics garnered from the communications activities of nodes within the networks. However, these do not perform well in sparse / harsh environments such as those found in Underwater Acoustic Networks (UANs) [1]. As node capabilities increase,...
The Mobile Ad-hoc Network (MANET) is a collection of mobile nodes. These nodes can setup and configured automatically without involvement of user. In MANET each node can move independently. Routing is the main issue because the topology in the MANET changed very fast. Due to power constraint the transmission process is multi hop in nature. Various security attacks can affect the throughput, end-to-end...
Mobile Ad Hoc NETworks (MANETs) have become eminent resources for providing communication to military and other defence establishments operating in the conventional battlefield scenario in enemy territory or Counter Insurgency/Counter Terrorism operations beyond the reach of a permanent network infrastructure. However, MANET's inherent topology lack in defensive procedures and are thus, vulnerable...
Message authentication is a mechanism to verity the integrity of a message and it can be achieved using Message Authentication code (MAC) also called as keyed hash function. An ideal Hash algorithm will require a cryptanalytic effort greater than or equal to the brut-force effort. In the recent time, there have been enough efforts in developing cryptanalytic attacks on Hash algorithms. The hash algorithms...
Reputation systems are an emerging area of research in ad-hoc networks. They have been introduced as a security solution for nodes' misbehaving problem. A reputation system should cope with any kind of misbehavior. It enables honest nodes to make fair decisions about their neighbors. This may encourage nodes to behave well and cooperate in order to avoid being penalized or isolated. In this paper,...
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which breaks the static correspondence between TEID...
Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types...
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. In a distributed Mobile Ad Hoc Network (MANET), collaboration and cooperation is critical concern to managing trust. The networks work well only if the mobile nodes are trusty and behave cooperatively. Due to the openness in network topology and absence of a centralized...
A MANET is a infrastructure-less and auto configurable network of mobile nodes which are connected without wires. As per proposal of this paper, the communication in a MANET works on set of random keys called KEY1=X+KEY0, KEY2=X+KEY1, KEY3=X+KEY2…KEYN=X+KEYN−1 to establish the connection between nodes and applies to validate the packets. Since there could be a issue of keys length, hence we can enforce...
MANETs hold the potential to replace the existing wireless technology mainly because of the features it provides like ease of deployment, no need of infrastructure, support of dynamic topology, etc. Therefore, addressing the issues of MANETs is very important. Security of MANETs has always been an important issue affecting their reliability and even their usability and that of routing algorithms plays...
Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing...
For wireless sensor networks deployed to monitor and report real events, event source-location privacy (SLP) is a critical security property. Previous work has proposed schemes based on fake packet injection such as FitProbRate and TFS, to realize event source anonymity for sensor networks under a challenging attack model where a global attacker is able to monitor the traffic in the entire network...
This paper addresses security and performance issues of MANET. A novel cluster oriented concept is proposed to enhance security and efficiency of the network. Proposed strategy insures the optimum performance of MANET in presence of black hole attack. The simulation of the proposed methodology is carried out using NS2 network simulator and the simulation results reflects the performance of scheme...
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.