The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Local maximum problem, where the node fails in determine the next-hop neighbor to continue forwarding the packet towards the destination, severely degrades the performance of geographic routing protocols. This degradation is more substantial in underwater sensor networks, that intrinsically have harsh environments and high energy consumption due to the underwater acoustic communication characteristics...
In wireless sensor networks, an important challenge often faced in geographic greedy forwarding is the local minimum phenomenon which is caused by holes. For solving this problem, most hole-avoiding protocols route packets along the perimeter of holes or forbidden regions. Thus, sensor nodes on the perimeter of holes and forbidden regions exhaust their energy faster than others, which enlarge the...
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced...
Wireless Mesh Networks (WMNs) consist of several Access Points (APs) of Wireless Local Area Networks (WLANs) interconnected through wireless link. It is necessary to monitor the networks in order to properly operate WMNs. However, it is very difficult to always monitor WMNs. Though several researches for visualization system of WMNs were done, there are some problems such as lack of dynamic information...
The IPv6 Routing Protocol for Low-power and Lossy networks (RPL) is a standard routing protocol to realize the Internet of Things (IoT). In order to realize secure IoT network, the Destination-Oriented Directed Acyclic Graph (DODAG) root collects information such as neighbor and parent ranks in each node and then observes network consistency by comparing a rank that a node sends to DODAG root with...
The next generation Internet supports dynamic deployment of different protocols and heterogeneous applications. To support this, routers in next generation computer networks use general purpose programmable packet processors. The customization of routers introduces increased vulnerabilities and attacks that allow potential attackers to compromise the router. Since network routers play a key role in...
In this paper, we address the problem of detecting blackhole attack targeting the Multi Point Relays (MPRs), using Vehicular Ad hoc networks-Secure Optimized Link State Routing protocol (VANET-OLSR). In the literature, watchdog model was proposed to detect network related attacks. However, this technique relies on routing level monitoring, which suffers from high false positives due to channel collision...
An architecture of underwater sensor networks and a two-tier routing protocol for cluster-based underwater heterogeneous sensor networks-TTCB protocol have been proposed in this paper. The architecture includes the upper sensor nodes, the lower sensor nodes, sink node on the sea surface and the base stations on the land. All sensor nodes form two heterogeneous clustering structure. According to the...
Ad hoc network is an autonomous collection of mobile nodes communicating over wireless links where the node scan communicate with each other in temporary manner with no centralized administration and in a dynamic topology that changes frequently. A malicious node can constantly report incorrect information to other nodes in the network, which can lead to whole network down. The proposed work identifying...
Mobile ad-hoc networks are more vulnerable to security attacks due to their unique characteristics such as dynamic topology, no fixed infrastructure, resource limitations and multi-hop scenario. In MANETs one the dangerous attack is packet dropping attack. This packet dropping attack is two types: 1. Black hole and 2. Gray hole. In both the attacks, an attacker sends the false reply to source node...
In mobile ad hoc networks (MANETs), a layered approach to networks makes a routing protocol to be responsible on discovery of a path between two nodes. However, this approach has fundamental limitations in diversifying the strategies of routing in a network when various types of applications require different routing support. In this paper, we propose an application-driven path discovery mechanism...
Wireless sensor networks and, particularly wireless body area networks (WBANs) are the key building blocks of upcoming generation networks. Modern health care system is one of the most popular WBAN application and a hot area of research in subject to present work. In recent years, research has focused on channel modeling, energy conservation and design of efficient medium access control (MAC) schemes...
In this paper, we propose a reliable, energy efficient and high throughput routing protocol for Wireless Body Area Networks (WBANs). In Forwarding Data Energy Efficiently with Load Balancing in Wireless Body Area Networks (FEEL), a forwarder node is incorporated which reduces the transmission distance between sender and receiver to save energy of other nodes. Nodes consume energy in an efficient manner...
The article presents a number of issues concerning the integration of many information systems and automation equipment in order to ensure full control and improve the user experience. Particular attention is paid to the security systems installed in public utility facilities, including fire protection systems used in urban subway objects (with Warsaw subway as an example). Structure of the integrating...
In this paper, we present a novel bio-inspired trusted routing framework (B-iTRF) which composed of trust mechanism and routing strategy. For trust mechanism, B-iTRF monitors neighbors' behavior in real time and then assesses neighbors' trust value based on the priori knowledge. For routing strategy, each node finds routes to the Sink based on ant colony optimization. In the process of path finding,...
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large Internet service disruptions. Route leaks are caused because of violation of routing policies among Autonomous Systems. Unfortunately, there are not many studies that formally and thoroughly analyze the route leak problem. There exist few conventional solutions that can be used as a first line of defense,...
The routing algorithm is one of key researches of interconnection networks and wireless sensor networks (WSN) design. WSNs are application specific, hence lots of attention has been given to routing protocol. Since the life time of sensor nodes depend on available power, therefore in order to prolong the age of sensor nodes, it is necessary to design efficient routing protocols. The routing protocols...
A Mobile ad-hoc network (MANET) is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to this it is vulnerable to various kinds of security threats. Black hole attack is one of such threats. This paper lead emphasis on AODV routing protocol in MANET, along with various types of security attacks and security threats...
Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In...
Disaster Management is one of the most demanding application in wireless ad hoc networks as establishing infrastructure based networks are nor suitable in that environments. In this paper we have tried to develop a routing protocol to deal with disaster recovery system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.