The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The combination of a MANET (Mobile Ad-hoc Network) domain environment with multicast services introduces new challenges towards group confidentiality infrastructure. The existing technique for the rekeying operation has a critical problem in performing a key update immediately after each member change. Instead of rekeying, this paper proposes a new membership processing that occurs whenever a new...
People continuously try to improve their quality of life and technologies have an important role on it. Money transaction between mobile devices is bored and a difficult operation to perform since there is not a simple and safe way to do it. Near field communication (NFC) is a new secure short-range wireless connectivity technology, can play an important role on this kind of issues, and it is very...
The emergence of mobile P2P systems is largely due to the evolution of mobile devices into powerful information processing units. The relatively structured context that results from the mapping of mobile patterns of behaviour onto P2P models is however constrained by the vulnerabilities of P2P networks and the inherent limitations of mobile devices. Whilst the implementation of P2P models gives rise...
An Unattended Wireless Sensor Network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors close to the base station deplete their power earlier than others. An UWSN can save the battery power and prolong the network lifetime. Unfortunately, MSs would be given too much privilege...
Mobile devices have become ubiquitous, allowing the integration of new information from a big range of objects. But the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA protocols implementation for mobile devices using J2ME. The main value of JXME is its simplicity when creating peer-to-peer (P2P) applications on limited devices. However,...
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. The implementation is assumed to take place in the context of a language named Join Voyagers used to program a Peer-to-Peer network using object oriented techniques and Join methods. A mobile agent is an object that can migrate throughout a heterogeneous network of computers,...
Service Oriented architecture (SOA) on Mobile Ad hoc NETwork (MANET) promotes the effort to deploy the day to day business and other services over the ad hoc mobile environments. In this paper several research challenges have been summarized related to the service publishing, registration indexing, availability, discovery and composition on dynamic environment of MANET. Several general issues related...
Data Management is the execution of a pool of activities on a set of data to conform to the end user data requisitions. MANET is an emerging discipline of computer networks in which a group of roaming hosts spontaneously establishes the network among themselves. The employment of data management in MANET can engender a number of useful applications. However, data management in MANET is a taxing job...
In mobile ad hoc networks, one challenge in certificate revocation design is to revoke malicious nodes' certificates accurately. In this paper, we build up on our previously proposed scheme [1], which enables the recovery of falsely accused nodes' certificates. This scheme is a cluster-based certificate revocation scheme that divides the network into clusters of one cluster head and cluster members...
While significant research effort has been dedicated to wireless localization over the past decades, most aspects of location security have been overlooked. In particular, adversaries can take advantage of security vulnerabilities of current location systems to launch location spoofing attacks, thus disguising their position in the network. In this paper, we address issues associated with location...
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing...
The importance of mobility in networks is being increased together with its number of users and applications. However, we still do not have broadly accepted solutions for mobility in Internet or other type of networks. In particular, mobility is difficult in heterogeneous networks, where heterogeneity could expand over ownership, administration, technology, and so on. We propose for such heterogeneous...
This paper describes the concept of wisdom networks. First, we overview some related intelligent networks and propose the wisdom network. Then, the analysis of wisdom node is outlined. And then, the architecture of wisdom network is proposed. Open research issues for the realization of wisdom network are also discussed.
Security is one of main challenges that obstruct the wide adoption of mobile P2P systems. Current decentralized trust-management research focuses mainly on providing software resource level security schemes by trust models and algorithms, whereas potential merits of hardware-based security mechanisms to further secure application exposure have not been considered so far. This paper presents a new...
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
Concepts for a next generation Internet architecture quite often propose to decouple identifiers from locators. The so-called locator/identifier-split solves several problematic issues of today's Internet architecture. At the same time, however, a user's location is exposed within the whole network and any participant can be traced. Privacy considerations, therefore, need to be a key design element...
Mobile ad-hoc networks are prone to a number of security threats. The fact that mobile ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such...
The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper we present a next-generation...
Truly ad hoc networks where no prior knowledge of participants to each other creates difficulties in providing encryption key management services to the network members. If the network uses Public Key Infrastructure (PKI) then a Certificate Authority (CA) must be available at all times. Using threshold cryptography for the CA requires several members to act as servers and collaborate to provide these...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.