The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper evaluates current research status of cloud-based payment through quantity analysis, based on bibliometrics involving analysis of author, keywords and abstracts. Then qualitative analysis is conducted for all kinds of cloud-based payment, essential characteristics involving pros and cons, interconnections and improvement potential among various methods to realize cloud-based payment. Finally,...
Due to their rapid evolution, mobile devices demand for more dynamic and flexible networking services. A major challenges of future mobile networks is the increased mobile traffic. With the recent upcoming technologies of network programmability like Software-Defined Network (SDN), it may be integrated to create a new communication platform for Internet of Things (IoT). In this work, we present how...
Prevalent concerns with dynamic networks typically involve security. Especially with resource constraints in dynamic networks such as mobile ad-hoc networks (MANETs), security needs to be of particular consideration. In this paper, we first analyze the solution concept involved in optimizing resource allocation and data packet forwarding. In a MANET, the availability of having data packets forwarded...
In security context, mobile ad-hoc network is more vulnerable compare to conventional networks because of open environment and lack of physical tight proximity. Therefore attackers get opportunity to commit crime using these vulnerable points. Several types of attacks committed by attackers to impact network functioning and performance. Attacks committed by intruders that are part of network and compromised...
This paper presents a secure communication application called DiscoverFriends. Its purpose is to communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide...
Multi-hop Cellular Network (MCN) is a promising architecture aiming to enhance the performance of the current single hop cellular network. Indeed, it combines the flexibility of Ad Hoc networks and the benefits of the fixed infrastructure. The traffic is relayed through multi-hop communication, which can extend the coverage area and achieve high throughput. Providing security in this type of network...
Cloud computing is an effective approach for organizing computing resource which can improve service capability of WMNs remarkably. However, some drawbacks of wireless networks exist inherently make the cloud computing in WMNs insecure with various threats. In this paper, a novel hierarchical framework which is more compatible for cloud computing in WMNs is proposed, a completed security architecture...
Due to the unique characteristics of disruption-tolerant networks (DTNs), such as sporadic and unpredictable connectivity, routing protocols in DTNs are facing many challenges. Message propagation follows the manner of store-carry-and-forward and the existing opportunistic data forwards routings under the hypothesis that each individual node is ready to forward packets for others. This hypothesis...
Mobile adhoc networks (MANETs) consist of mobile nodes with no fixed infrastructure. Dynamic Source Routing (DSR) which is on-demand routing protocol is a widely accepted mobile adhoc network routing protocol used to provide connectivity to mobile nodes. However, DSR and other on-demand routing protocols are vulnerable to different types of security attacks and black hole attack is one of them. In...
Mobile sensor networks enable the monitoring of remote and hostile environments without requiring human supervision. Several approaches have been proposed in the literature to let mobile sensors self-deploy over a region of interest. In this paper we study, for the first time, the vulnerabilities of one of the most referenced approaches to mobile sensor deployment, namely the Voronoi-based approach...
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
Mobile ad-hoc networks are a new field in networking because it works as an autonomous network. Application of mobile ad-hoc networks are increasing day by day in recent year now a days. So it important is increasing to provide suitable routing protocol and security from attacker. Mobile ad-hoc network now a days faces many problems such as small bandwidth, energy, security, limited computational...
Security is one of the most significant aspect in a mobile healthcare system. A number of methods are followed, in order to prevent malicious behaviour from revealing confidential information. The availability of pervasive communications as well as mobile accessories benefits the patients and healthcare units. MANET's are one of the best examples of mobile healthcare units. In such networks, all mobile...
In mobile ad-hoc networks (MANETs), data transmission is usually performed between mobile entities in an environment without infrastructure. So, data security is a key issue in MANETs. In this paper, we propose a security solution for the routing protocol OLSR. Our system is based on a new approach of asymmetric and dynamic encryption. Our goal is to properly secure the traffic against potential attacks...
Location-Based Services (LBSs) are becoming increasingly popular in our daily life. In some scenarios, multiple users may seek data of same interest from a LBS server simultaneously or one by one, and they may need to provide their exact locations to the un-trusted LBS server in order to enjoy such a location-based service. Unfortunately, this will breach users' location privacy and security. To address...
Networks are used in various fields. Network's popularity has motivated the development of mobile ad-hoc networks (MANETs). A mobile Ad-hoc network is a kind of decentralized wireless system which creates a fast changing network. Due to the dynamic nature and changing topology, MANET is a growing dynamic network, also called mobile mesh network. Mobile ad-hoc network has various kinds of security...
A clustering architecture increases network lifetime, fault tolerance and results in more efficient use of network resources. Mobile Ad-hoc Networks (MANETs) are extremely vulnerable to a variety of misbehaviors because of their basic features like: lack of communication infrastructure, dynamic network topology and short transmission range. To detect and reduce those misbehaviors, numerous trust management...
In recent years, MANETs have been developing rapidly and are increasingly being used in many applications, ranging from military to civilian and commercial uses. The security has become one of the primary concerns as MANETS are being used widely. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key is necessary to be shared between the sender and the receiver...
Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Network (MANET) technologies, offer considerable advantages for military operations, such as increased network survivability and interoperability. The RRS-based Common Tactical Radio System (GTRS), currently in development by the Swedish Armed Forces, is designed for use in diverse geographical settings and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.