The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a solution to counter black hole attacks in mobile ad hoc networks (MANETs). Black hole attacks are effective DoS (Denial of Service) attacks committed by fabricating routing information, attracting packets routed through them, and then dropping the packets. The ETX (Expected Transmission Count) metric is a common routing metric in MANETs. It measures the delivery ratio of a wireless...
Wireless Sensor Networks is usually consisting of huge number of limited sensor devices which are communicated over the wireless media. As sensor devices are limited, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained. Therefore, security in WSNs is a challenging task due to inheritance limitations of sensors...
The exactness of sensed data transmission is essential for wireless sensor networks(WSN) applications. Based on clustering WSN architecture, a secure routing protocol with intrusion detection is hereby proposed, wherein an energy prediction model for nodes is used to detect attacks in cluster head election phase, and the key management technique is applied to stage of cluster formation to ensure security...
Ad hoc wireless networking is a new approach to wireless communication with potential applications in very unpredictable and dynamic environments. Many applications today, especially in military and emergency situations, are based upon ad hoc wireless networks. The security requirements of these networks are harder to enforce than in a traditional network. Securing the routing in ad hoc wireless networks...
Recently, with the development of wireless sensor networks (WSNs), many new routing protocols have been designed for WSNs. Routing protocols in WSNs, however, might differ depending on the application and network architecture. Furthermore, WSNs are exposed to numerous routing security threats. Therefore, it is headachy for us to choose secure routing protocols for application in WSNs. In respect that...
We present a new approach to secure routing in MANETs and argue that the same approach can lead to more reliable routing in the face of node and link failure. Prior solutions to security in networks is inapplicable to routing in MANETs because of node mobility and the relative scarcity of bandwidth. Furthermore, path discovery does not necessarily translate into data delivery. We argue that secure...
Providing secure routing in MANETs is far more difficult than in wired networks or static wireless networks. Node mobility and the relative scarcity of bandwidth render prior solutions ineffective. Solutions based on securing link or path information do not work well in MANETs because the dynamic nature of links requires extensive use of flooding. On the other hand, solutions based on hop-by-hop exchanges...
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes)...
Protecting sensitive routing information is very fundamental and critical in mobile ad hoc networks (MANETs)that operates in hostile environments, which also bring great challenges. Recent research have been focus on secure routing, however, most of them relies on cryptographic infrastructure, and which greatly limits their usage. To overcome these drawbacks, we propose MSR, a novel MPLS-like Secure...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper,...
This paper proposes an improved approach for secure routing protocol based on the one-way hash chain and the standby route which enhanced the route availability, the simulation results show that the approach can ensure lower route request frequency and higher data reception efficiency, even though there are mobile or incooperative nodes in the network.
Ad hoc networks, which do not rely on fixed infrastructure such as base stations, can be deployed rapidly and inexpensively in situations with geographical or time constraints. However, the nature of ad hoc networks makes them vulnerable to attacks, especially in routing protocols. In order to establish a secure route composed only by trusted nodes and prevent routes from being tampered by internal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.