The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the secure ad hoc routing protocols are based on cryptographic solutions whose drawback is to decrease the network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature verification. The proposed protocol is...
In this paper, we present new protocol design scenario like Re-Pro Routing Protocol (RPRP) for Broadcasting in wireless mobile Ad-hoc Network and a comparative performance for Mobile Ad hoc Networks protocols like as Ad-hoc On-Demand Distance Vector Routing protocol focusing on the effects of changes such as the increasing number of receivers or sources and increasing the number of nodes. Although...
Most networks require that their users have "identities", i.e. have names that are fixed for a relatively long time, unique, and have been approved by a central authority (in order to guarantee their uniqueness). Unfortunately, this requirement, which was introduced to simplify the design of networks, has its own drawbacks. First, this requirement can lead to the loss of anonymity of communicating...
Security has been recognized as a key issue for the expansion of eHealth application, where highly sensitive patient's medical data are routed through a non-secure wireless network. In this paper, we look into the various security and privacy requirements for the eHealth application and propose an agent-based secure and trustworthy packet-forwarding Protocol (ASTP) considering the neighbor nodes previous...
It has been proved that Asymmetric cryptography can be used in Wireless Sensor Networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery process are trusted nodes. Digital signatures based on ECC is used in our protocol, therefore, our protocol has many virtues, such as less energy cost, more rapid calculation, shorter...
In this paper, we propose an approach based on one time passwords to secure the DSR protocol. The main concern of this work is to provide an efficient level of security for DSR keeping in mind as a main objective the minimization of the calculation cost. Some experimental results are presented to show the effectiveness of the proposed solution.
Online social networks (OSN) have now become one of the most widely used Internet applications with a huge base of online users. In an OSN, the users exchange their personal information via messages, pictures and videos with their online peers/friends for their personal or business interests. Since the information that flows across an OSN is generally of personal in nature, it is important that the...
This paper proposes a secure wireless link creation scheme based on a multi-path routing in a single-hop wireless transmission environment, where multiple paths are created by directive transmission using the multipath component of wireless link which the link possesses naturally on its own. Moreover a secret sharing method is employed to divide the transmitted information into pieces of shared information...
Due to volatile and rising energy prices, smart microgrids appear to be increasingly popular. Instead of one centrally located power plant, the microgrids will rely on solar panels and wind turbines on every house sharing renewable energy among houses. How to efficiently and optimally share energy is a challenging problem. In order to efficiently share renewable energy, routing protocols in the data...
In disasters and emergency scenarios, due to a lack of network infrastructure, first-responders can build mobile ad hoc networks to send information and help disaster response coordination. However, the communication in these situations can suffer from long interruptions. This paper proposes a security management framework to dynamically configure or reconfigure emergency networks, in order to adapt...
Wireless sensor networks (WSNs) are an important direction for the Internet of Things. Node capture attacks are one prospective kind of attack on WSNs. To counter this attack, we have previously proposed secure decentralized data transfer. In this proposed method, it was assumed that multiple paths were in place. We also have to consider node failures when we design the data transfer method on WSNs...
With wireless sensor networks (WSNs) reaching maturity, security is becoming a greater concern. Just like traditional networks benefit from SSL or IPSec, WSNs require a security architecture that prevents basic attacks to data privacy, authenticity and integrity. There are lots of disparate solutions for these problems but nothing to actually put them together into a robust architecture. This paper...
Wireless Sensor Networks(WSNs) bring together many applications and disciplines to capture the most intensive economical development of the century. The objective of this paper is to provide a snapshot of the trust-based security mechanism for WSNs. Three kinds of trust information are summarized. After analyzing the security problems and brief reviewing of the trust management for WSNs, a comparing...
Wireless sensor networks (WSN) are generally set up for gathering records from insecure environment. Nearly all security protocols for WSN believe that the opponent can achieve entirely control over a sensor node by way of direct physical access. The appearance of sensor networks as one of the main technology in the future has posed various challenges to researchers. Wireless sensor networks are composed...
The unmanned nature of wireless sensor networks make them very vulnerable to the malicious attacks. Therefore, how to complete secure data collection under different conditions is the crucial issue to wireless sensor networks. There have been a few on-going research efforts about multipath routing for secure data collection. In this paper, we make full use of the broadcast message when wireless sensor...
MANETs have two characteristics that make traditional routing protocols cannot be applied in a straightforward manner to achieve their objectives: firstly, the lack of a default infrastructure; secondly, the variability of this infrastructure once the nodes forming the network move themselves and vary their relative position to the other nodes. Owing to this, specific routing protocols are developed...
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily...
Anonymous communication has been a long recognized problem, and various solutions of different performance have been proposed over the last decades. Manifold differently strong security notions, being specific for the sender or receiver, are found in the literature. We consider protection of both, the sender's and receiver's identity from each other and a coalition of intermediate relay nodes. The...
A Mobile Ad hoc Network (MANET) consists out of a collection of mobile nodes capable of sending and/or receiving wireless communications. MANETs are generally unstructured networks with no centralized administration. MANETs use routing algorithms to establish routes among nodes. This unstructured nature presents the opportunity for misbehaviour among nodes. Trust based MANET routing protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.