The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security...
Conventional risk assessments in Ad-Hoc Networks always require sample satisfy specific distribution with large quantity and establish models through subjective judgment, these methods lack general applicability, objectivity and credibility. Moreover, some models only focus on single time point evaluation and failed to thoroughly reveal dynamic behavioral character. To solve these problems and make...
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack...
Identity disclosure is a security and privacy concern in mobile ad-hoc networks. Previous proposals suggest using anonymous routing protocols. These solutions are limited on certain routing protocols, and cannot be applied to higher layers. In this paper, we propose the requirements of an general-purpose identity hiding scheme, and present schemes based on popular cryptosystems: AES, RSA, and ElGamal...
In ad-hoc environments, all nodes have function to set themselves a route and build a network. It is important how trustable each node is in the environment. This study proposes the cluster-based trust model, and uses the model to discuss how you can solve some possible problems occurred in the network. The reputation from a neighboring node is applied to the calculation of the trust value. If the...
Since ad-hoc networks have no fixed infrastructure, there are many different kinds of Bluetooth-enabled ad- hoc networks with various security procedures and security requirements. In this paper, we make further classification of Bluetooth-enabled ad-hoc networks and their security procedures/requirements depending on a risk analysis within each classified group. In addition, we evaluate possible...
Many mobile computing models try to solve many issues related to the mobile computing such as: mobile movement, data synchronization, embedded databases, data privacy and confidentiality, P2P dissemination models, middleware adaptability, and mobile transactions. In this paper we will focus on the last area which is the mobile transactions and a new model (The diagonal allocation grid and fixed timeout...
The following topics were dealt with: ad-hoc networks; Web services and applications; network security and trustworthy systems; P2P computing; scalable computing; agent-based computing; distributed algorithms; distributed data management; wireless sensor networks; autonomic computing and system; innovative networking; multimedia systems; distributed data processing; mobile systems; ubiquitous computing;...
A wireless ad-hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad-hoc networks may be unprotected against attacks by the malicious nodes. In this study the effects of black hole attacks on the network performance was investigated. Black...
In many parallel and distributed applications broadcasting represents a natural way of communication between processes/objects/actors. In addition mobility is often mandatory, as for instance, for the development of ad-hoc networks applications. The fusion of these two concepts into one unique and coherent model of concurrency represents a great interest for the development of such classes of applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.