The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we are proposing an efficient secure solution to the data centric routing protocol One Phase Pull diffusion which permit multi-hop routing of sensed data. SecOPP provides both Group and Pairwise key distribution with the possibility of rekeying as well as security services: integrity, authentication and confidentiality of exchanged messages. All these are obtained without using a key...
Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process...
The recent proliferation of wireless devices extends the scope of mobile ad hoc networks (MANETs) applications beyond the military domain to include civil and commercial application scenarios. Since MANETs are composed of mobile terminals with limited resources, MANET security remains an unsolved and motivating challenge. Due to advantageous like in-frastructureless and spontaneous deployments, MANETs...
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover,...
Wireless mesh network is a new type of network paradigm in which each node communicates to others to enhance network reliability and performance. Routing in wireless mesh network is a challenging task. Despite from the traditional routing, field based routing uses a little information to route the packets. Due to this characteristic, field based routing algorithms are inexpensive and robust, but such...
In order to establish a trusted and secure wireless mesh network, routing protocols should not only ensure the integrity, confidentiality and authentication, but also take into consideration the fact that the application of routing strategies should not impact the performance of routing protocols to a severe extent. This paper adopts Node's Trust as a routing parameter, and some improvements are made...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One such field concerns mobile ad hoc networks (MANETs) where the participating nodes do not rely on any existing network infrastructure. By definition, the nature of ad hoc networks is dynamically changing and they have a fully decentralized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.