The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks (WMNs) have been a major research focus in the recent years leading to a profusion of protocol proposals. While most existing implementations address routing aspects, none of the proposals addressing security aspects have gained acceptance in practice, due to their high overhead or strong assumptions. To cope with security issues in current WMN deployments, well-known non-secure...
The introduction of IPv6 in the area of air traffic control communications is slowly advancing. The Network Mobility (NEMO) protocol can support the mobility of an airborne mobile router (MR) across different air-ground access technologies that are used during different phases of flight. Similar to Mobile IP, NEMO relies on forwarding all traffic via a home agent. No standardized route optimization...
Mobile IP version 6 (MIPv6) is an IP layer mobility protocol for the IPv6 Internet. Route Optimization (RO) in Mobile IPv6 provides a mobile node (MN) the opportunity to eliminate the inefficient triangle routing with its corresponding node (CN) and therefore, greatly improves the network performance. However, in doing so, MIPv6 introduces several security vulnerabilities, and among them a major concern...
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security...
In mobile IP, the home agent (HA) is an essential component. Mobile nodes will not function properly if the HA cannot be reached. Enhanced Route Optimization applies the Cryptographically Generated Home Address in the Mobile IPv6, to enhance the security and reduce the handoff delays. Unfortunately, it cannot provide home prefix validation. Communication with the Home Agent is still required to avoid...
A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Nodes in ad-hoc networks play both the roles of routers and terminals. Moreover, the routing path in ad-hoc networks is dynamic; it is not fixed as in wired networks. Therefore, some security...
Roadside units (RSUs) aided certificate service is a promising approach for ensuring security and privacy preservation in vehicular ad hoc networks (VANETs). In existing approaches, a vehicle can update certificate only when it passes by RSUs, however, this is impractical in many scenarios. Consequently, if there are no RSUs on the original driving trip, drivers have to adjust routes which means wasting...
The spatiotemporal and just-in-time mobile multicast routing protocol of Wireless Sensor Network, such as Mobicast, which has the perfect usefulness in monitoring Mobile entities, Communications with higher security requirements. Most of the existing Mobicast routing protocols is focused on the group key distribution and management, but also realized under the conditions of static grouping, which...
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network...
Mobile agent technology has emerged as a promising paradigm for a number of applications. However, an autonomous agent running on hosts may suffer attacks if the hosts are malicious. Possible targets of attacks include the collected messages and agents' route message. In this paper, by using a novel cryptographic technique signcryption, a new protocol for protecting a mobile agent from malicious hosts...
MANET brings evolution in wireless mobile ad hoc network but it has to face many difficulties due to the dynamic network topologies, lack of centralization, inadequate authentication mechanism, insecure routing and are vulnerable to different types of attacks. Different types of denial of service attacks occur in MANET which is one of the major problems. We used AODV routing because it offers quick...
Composed of mobile nodes, MANETs rely on the entire collaboration of nodes to provide routing and forwarding functions. Many solutions have been proposed to enforce the collaboration of nodes in MANETs. Most of them rely on monitoring mechanisms to detect selfish or malicious behaviors. These mechanisms have in common the implicit use of MAC layer information in their detection process. This paper...
The black hole attack is one of the security attacks that occur in Mobile Ad-hoc Networks (MANETs). In the attack, a malicious node exploits the routing protocol to advertise itself as having the shortest path to the node whose data packets it wants to intercept. In this paper, the black hole problem is addressed. An authentication mechanism, based on the hash function, the Message Authentication...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Therefore an intrusion detection system (IDS) is required that monitors the network, detects misbehavior or anomalies and notifies other nodes in the network to avoid or punish the misbehaving nodes. Numerous schemes have been proposed for intrusion detection and response systems,...
Security is an important feature to be considered for successfully deployment of PARTY protocol. In this paper, firstly, we will identify a variety of attacks that could affect and disturb network functionality. Without any authentication mechanism and incentive for cooperation, network performance can be severely degraded. Here we propose a preventive and corrective mechanism based in the token solution...
Numerous schemes have been proposed for secure routing and intrusion detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent intrusion detection system (IDS) for ad hoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.