The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
In a Mobile Ad-hoc NETwork (MANET), information sharing is usually performed by distributing advertisements and queries. In order not to load environments with unnecessary traffic, an advertisement policy should be designed according to users’ information consumptions and provisions, which are limited by users’ stay-times and their contexts. In this paper, we propose an algorithm to parameterize advertisement...
The progress in mobile devices and wireless communication technologies magnifies the importance of opportunistic networks like Mobile Ad-hoc NETworks (MANETs). In MANETs, information sharing is performed by distributing advertisements and queries. In order not to load the environment with unnecessary traffic, file advertisement and query resolution should be performed according to the interests of...
In Mobile Ad-Hoc NETwork (MANET) there are many uncertainties like topological changes, number of nodes, mobility etc. Since the design of routing protocol is carried out by considering a particular environment, no existing routing protocol performs well for all possible environments and requirements. This paper proposes an adaptive protocol selector for MANET which helps in selecting an optimum routing...
Mobile ad hoc networks (MANETs) are susceptible to various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty...
The emergence of context-aware systems has highlighted the requirement to reduce complexity in developing the systems by establishing a context middleware. The middleware aims to provide support for managing context independently from applications and enhance generality and reusability of context sources for multiple applications. In this paper we propose a novel framework for managing context in...
The MIDAS project has developed a middleware platform for context aware MANET services. A key problem with MANETs is the lack of a central authority and pre-existing trust. Thus it is hard to enable a trusted environment where context can be verified and trusted by peers. This paper describes how the MIDAS middleware can become "secure enough" for typical applications by identifying which...
This article addresses the media-handling aspects of multimedia conferencing in multihop cellular networks. Participation in multimedia conferences in MCNs may be confined to either the conventional cellular network or the MANET. Participation also can span both networks. However, neither the media-handling architectures currently in use in conventional cellular networks, nor the ones in use in MANETs...
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in resource sharing. As nodes can join/leave the network randomly therefore nodes may not aware to which nodes is it connected with and this make resources been shared among anonymous nodes which can be trusted/not trusted. This has created unfavorable situation for private transaction...
The protocols and architectures of the ad hoc networks of today reflect the severe memory and processing constraints that were imposed on computing equipment that was dedicated to communication tasks 40 years ago. As a result, most protocols are decoupled from the physical medium, each protocol layer operates independently of others, and processing and storage "inside" the network is kept...
In this paper we present a context-aware data sharing service over MANet to enable spontaneous collaboration between mobile workers. Context information is used to adapt services and applications to user situation as well as working groups situation. The paper first presents the data sharing system. It then describes the context awareness service. We explain how data sharing uses context information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.