The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust...
Nodes in MANETs are subject to many security leaks, because the communication between nodes occurs using the wireless medium without an infrastructure. Each node has a limited amount of energy available, because they are powered by batteries. Performing monitoring operations to establish whether a node is fair or not requires a large amount of energy, hence their reduction is desirable when they are...
The security is a key aspect in Mobile Ad-hoc Networks (MANETs), because the communication between the nodes is obtained using the wireless transmission, and the network setup is done without an infrastructure. In this scenario it is possible to perform internal and external attacks compromising the network functions. Moreover, the adoption of Intrusion Detection System (IDS) to discover internal...
Mobile ad-hoc networks allow communication between mobile nodes without the existence of an infrastructure, so they are adaptable also in hostile environments. Using the wireless communication leads to a lack of security. Due to the characteristics of mobile nodes, they have batteries as power source, so their energy is constrained. A routing protocol for MANETs has to take into account this constraint,...
Ad-hoc networks allow nodes communication without an infrastructure, so they can be used in many environments. This lack of infrastructure introduces many security threats to the nodes in the network. Communication between nodes must be reliable, and protocols for MANETs need to make it possible. Due to the wireless channel and to the possible malicious behavior of nodes, it is necessary to introduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.