The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In mobile ad hoc networks packets dropping is a classical weakness that may be caused either by misbehaving nodes or just faulty links. Isolating the nodes behind such effects is an efficient solution for decreasing packet loss. We propose, in this paper, a new secure protocol to monitor, detect, and safely isolate misbehaving nodes. The proposed solution is based on authentication and trust. First,...
Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying...
Mobile Ad Hoc Network (MANET) is a distinct kind of network where the nodes are connected by way of wireless medium and without any infrastructure. Nodes in the network are fully dependent on other nodes so as to complete the communication successfully. In addition to this, nodes are moving freely and make dynamic topology. Moreover these types of network can be easily constructed whenever and wherever...
Mobile ad hoc network (MANET) is a distinct kind of network where the nodes are connected by way of wireless medium and without any infrastructure. Nodes in the network are fully dependent on other nodes so as to complete the mission successfully. In addition to this, nodes are moving freely and make dynamic topology. Moreover these types of networks can be easily constructed whenever and wherever...
Maintaining security associations (SA) in mobile ad hoc networks (MANET) is challenging due to their intrinsically open, dynamic, and decentralized nature. Bandwidth limitations arising from both the physical characteristics of the wireless medium and the control overhead required to maintain routes in a network with changing topology add another level of difficulty to the problem. While establishing...
A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Design of an efficient and...
Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include uncertainty in the reputation system. Specifically,...
To deal with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of mobile ad hoc environment and mobile devices. This paper presents a Secure and Lightweight...
We find that traditional authentication ways donpsilat act well in MANETs for the features of dynamic topology and non-existence of central facilities in mobile ad hoc networks. This paper presents a distributed trust proving language, which is based on role trust. The solution of constructing credential authentication infrastructure and the problem how to perform automated trust negotiation are also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.