The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive...
Today Networks are protected using many firewalls and security software's. Several of them are not sufficient and effective. Many intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or their efficiency, but they do not address the security problems. A number of nodes may be selfish meaning that by not forwarding the packets to the target, thereby cutting...
Distributed nature of Mobile Adhoc NETwork (MANET) and dynamically varying topology lead to a number of security threats in MANET. Malicious behavior of the participating entity disrupts normal functioning of the network. Moreover one major problem with continuous participation of nodes in MANET is energy consumption which often leads to selfish behavior of participating entity. Here we propose a...
Pervasive social communications are instant social activities through communications based on mobile elements, e.g., via mobile ad hoc networks. Meanwhile, fashionable technology is becoming a trend in Human-Computer Interaction (HCI) design. It extends the traditional understanding of HCI by emphasizing aesthetic element. This paper investigates how to use fashionable technology in pervasive social...
Trust is a directional relationship between two parties; the trustor and trustee. To manage trust, a procedure for trust management is needed. Trust in Mobile Ad-Hoc Network (MANET) during emergency case involves probability since it is not absolutely certain how much the nodes can be trusted, because there is not enough information collected by the time the decision needs to be made, hence creates...
With the growing popularity of wireless mobile ad hoc networks(MANETs), many security concerns have arisen from MANETs especially the misbehaving nodes pose a major threat. Node misbehaviour in ad hoc network is caused by lack of cooperation and goes under the name node selfishness. A selfish node does not directly intent to damage other nodes with active attacks but it simply does not cooperate in...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
For unpredictable manner of mobile ad hoc network (manet), due to mobility of nodes in network, the shortest path is not necessarily the better path. If we do not consider the stability of routing path, then wireless links may be easily broken. Hence it is important to find a route that endures a longer time. Recently, efforts in this field have dealt the parameters battery power or trust of a node...
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. Mobile ad-hoc networks (MANETs) have created problem in resource sharing as they are constructed via mobile nodes without any prior knowledge of the existing nodes which may not be trustworthy. Trust management appears to be a promising approach...
To deal with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of mobile ad hoc environment and mobile devices. This paper presents a Secure and Lightweight...
In this paper we propose a game theoretic framework for routing in mobile ad hoc networks. A trust oriented auction based packet forwarding model is developed for stimulating cooperation among the nodes avoiding the selfish behavior. Our proposed scheme provides incentive for cooperative behavior of the node and the amount of incentive is decided by the trustworthiness of a node. To find the cost...
Mobile ad-hoc network which is constructed via mobile nodes without the pre-registration of nodes have created problem in resource sharing. As nodes can join/leave the network randomly therefore nodes may not aware to which nodes is it connected with and this make resources been shared among anonymous nodes which can be trusted/not trusted. This has created unfavorable situation for private transaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.