The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
A few of existing multi-path routing protocols also address security issues. In this paper, a concept of plausible-route set is presented. Based on this notion, a definition of security for multiple node-disjoint paths secure source routing protocol is proposed and developed.
The black hole attack is one of the security attacks that occur in Mobile Ad-hoc Networks (MANETs). In the attack, a malicious node exploits the routing protocol to advertise itself as having the shortest path to the node whose data packets it wants to intercept. In this paper, the black hole problem is addressed. An authentication mechanism, based on the hash function, the Message Authentication...
The field that is the key issue of wire, wireless environment is security and many routing protocols are studied also at the ad-hoc network. In the mobile ad-hoc network which has no fixed base structure, the weakest point is security. This paper analyzed AODV protocol, which is a routing protocol, the important routing protocol in ad-hoc network, so that it can overcome the problem in security threats...
A major security vulnerability in the mobile telecommunication network is that wireline signaling messages are cleartext. The latest protocol for wireline signaling message security is mobile application part security (MAPSec), which protects MAP (a signaling message protocol) messages on the link between nodes. MAPSec is a limited solution because it still leaves MAP signaling messages unsecured...
Security is an important feature to be considered for successfully deployment of PARTY protocol. In this paper, firstly, we will identify a variety of attacks that could affect and disturb network functionality. Without any authentication mechanism and incentive for cooperation, network performance can be severely degraded. Here we propose a preventive and corrective mechanism based in the token solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.