The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A group of mobile nodes with limited capabilities sparsed in different clusters forms the backbone of Mobile Ad-Hoc Networks (MANET). In such situations, the requirements (mobility, performance, security, trust and timing constraints) vary with change in context, time, and geographic location of deployment. This leads to various performance and security challenges which necessitates a trade-off between...
A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with each other through electromagneticradio waves. Mobile Ad hoc Network (MANET) consists of mobile nodes, the network is infrastructureless. It dynamically self-organizes in arbitrary and temporary network topologies. Security is extremely vital for MANET. Attacks pave way for security. Among all the potential attacks...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic...
Named data networking (NDN) shifts today's host-centric Internet architecture to a new data-centric network architecture. This well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN allows routers to cache named content, leading to a significant improvement of content retrieval which, however, opens a door for many new attacks. In this work, we...
In security context, mobile ad-hoc network is more vulnerable compare to conventional networks because of open environment and lack of physical tight proximity. Therefore attackers get opportunity to commit crime using these vulnerable points. Several types of attacks committed by attackers to impact network functioning and performance. Attacks committed by intruders that are part of network and compromised...
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely...
As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data...
Networks are being used in various areas and the mobile ad-hoc network (MANET) is the network in Laptops, smart phones. MANET is a dynamic network without the fixed infrastructure due to their wireless nature and topology and changes due to their dynamic nature. In MANET various routing protocols are used, AODV routing protocol is one of them and the AODV has the different characteristics, AODV is...
Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major...
Mobile ad hoc network (MANET) has a distributed and uncontrolled nature in which all nodes are considered trusted and contribute in the route discovery process. Accordingly, MANET is vulnerable to many types of routing attacks. One of the most popular MANET routing protocol that is vulnerable to different attacks is ad hoc on demand distance vector (AODV) routing protocol. In this paper, a mobile...
A Mobile Ad-hoc Network (MANET) is a constantly self-configuring, infrastructure-less network of mobile devices where each device is wireless, moves without restraint and be a router to put across traffic unassociated to its own use. Every device must be prepared to constantly sustain the information obligatory for routing the traffic. And this is the main challenge in building a MANET. Such networks...
MANET is a continuously self-configuring, infrastructure less networks consisting of mobile devices which are connected by no any wired connection. Mobile devices are always in moving state. While transmission of data from one node to another the nodes establish a path with the help of intermediate nodes. Due to the mobility of nodes in the network the malicious nodes can be easily introduced in the...
Multi-hop Cellular Network (MCN) is a promising architecture aiming to enhance the performance of the current single hop cellular network. Indeed, it combines the flexibility of Ad Hoc networks and the benefits of the fixed infrastructure. The traffic is relayed through multi-hop communication, which can extend the coverage area and achieve high throughput. Providing security in this type of network...
Distributed nature of Mobile Adhoc NETwork (MANET) and dynamically varying topology lead to a number of security threats in MANET. Malicious behavior of the participating entity disrupts normal functioning of the network. Moreover one major problem with continuous participation of nodes in MANET is energy consumption which often leads to selfish behavior of participating entity. Here we propose a...
Mobile adhoc networks (MANETs) consist of mobile nodes with no fixed infrastructure. Dynamic Source Routing (DSR) which is on-demand routing protocol is a widely accepted mobile adhoc network routing protocol used to provide connectivity to mobile nodes. However, DSR and other on-demand routing protocols are vulnerable to different types of security attacks and black hole attack is one of them. In...
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
Mobile ad-hoc networks are a new field in networking because it works as an autonomous network. Application of mobile ad-hoc networks are increasing day by day in recent year now a days. So it important is increasing to provide suitable routing protocol and security from attacker. Mobile ad-hoc network now a days faces many problems such as small bandwidth, energy, security, limited computational...
This paper presents the revision of our concept to improve the public key infrastructure deploy ability and service reach ability in the mobile ad-hoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node's trust-worthiness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.