The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls under the category of Secure Multiparty Computation (SMC). The solution to SMC problems in Mobile Ad hoc Networks (MANET) can be found with the modification of the data inputs or with...
Wireless Sensor Networks (WSN) are a sensing, computing and communication infrastructure that are able to observe and respond to phenomena in the natural environment and in our physical and cyber infrastructure. The sensors themselves can range from small passive micro sensors to larger scale, controllable weather-sensing platforms. In this work, we investigate how the sensor network performs in the...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
The multicast routing is very important for Mobile Ad hoc Networks (MANET). Though many multicast routing protocol are proposed, we consider ODMRP, which is a mesh based routing protocol. In ODMRP the reliability of the communication can be maintained by putting the relay nodes in the mesh. However, when the network is overloaded the performance of ODMRP is deteriorated. In this research, we try to...
This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false detection rate. Thus, the proposed framework...
Currently, Transmission Control Protocol (TCP) is the dominant protocol used in the Internet. It is the transport protocol that is responsible for the transmission of around 90% of the Internet traffic. TCP was originally designed for wired network where packet loss due to congestion dominates. Mobile Ad Hoc Network (MANET), one of the wireless networks, has special characteristics which cause several...
In this paper, IDS (Intrusion Detection System) nodes are deployed in MANETs in order to mitigate black hole attacks. The IDS nodes must be set in sniff mode in order to perform the so-called ABM (Anti-Blackhole Mechanism) function, which is mainly used to estimate a suspicious value of a node according to the abnormal difference between the routing messages transmitted from the node. When a suspicious...
Security is a fundamental issue in the deployment of any kind of network, in particular those networks that affect people integrity. It is therefore important to detect the existence of any failure and to try to avoid its propagation as much as possible. In order to take maximum advantage of ad-hoc networks, protocols should be adapted to these new technologies by proposing new alternatives to centralized...
In order to deploy vehicular communication system, security and privacy issues have to be resolved. In this paper, for achieving secure and privacy preserving communications, an easily implementable PKI-based protocol is proposed. Security requirements for vehicular communications are defined and a detailed definition of the scheme, which uses shared asymmetric keys and PKI techniques to provide anonymous...
Non-recurring roadway traffic incidents are a part of everyday life that impedes normal traffic flow. One of the major challenges is to reroute traffic around incidents in order to maximize throughput. This often comes up when an incident occurs on a freeway and alternate routes need to be utilized on city and residential streets. Today's navigational devices can be used to find alternate routes based...
Mobile adhoc networks (MANETs) provide a means of communication when infrastructure is not available. Due to the interference caused through the sharing of a common frequency the capacity of such networks decreases as the number of users increase. This paper investigates how the insertion of additional nodes at strategic points coupled with control of nodes' transmission powers can decrease the interference...
In this paper we present a study of mobile connectivity for vehicular network in urban environment. The considered area is a real map divided into equally sized cells, each characterized by a set of information including the type of structure in the cell, cell altitude and cell attraction for vehicles. These characteristics are taken into account in two models: vehicular mobility model and electromagnetic...
In Mobile Ad Hoc Networks (MANET), routing messages are broadcast if a destination is needed or a route to destination is broken. In this paper, we introduce a route breakage probability model of a mobile ad hoc network in a motorway scenario. The model shows high probability of route breakage between vehicles driving in opposite and low probability of route breakage between vehicles driving in same...
Vehicular ad hoc networks (VANETs) have been proposed to provide safety and non-safety services for the passengers on board. Reliability in broadcasting of safety messages is one of the fundamental challenges in the design of such networks. In this paper, we study the impact of employment of repetition and piggybacking techniques on the performance of safety messages dissemination in an IEEE 802.11e-based...
This paper considers a realistic mobility model for a military application scenario using a wireless mesh sensor network. Within this model, the sink moves at the network boundary joining and leaving the network for different periods of time. Although the IEEE 802.15.5 standard has portability support for peripheral nodes (leaf devices) and is officially recommended for use in wireless mesh sensor...
Mobile Ad hoc Network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without the support of any centralized access point or existing infrastructure. The use of virtual topologies is a good alternative to build wireless multi-hop networks. It aims to maintain a topology that optimizes broadcasting or network performances. The problem is to determine an appropriate topology...
This paper investigates the performance of Multihop connectivity for inter-vehicle communication (IVC) systems in Vehicular Ad Hoc NETwork (VANET). The hop path between two or more vehicles is dedicated when a broadcast signaling for initiation connectivity is successfully guaranteed. In addition, the performance of vehicular connectivity is not only based on maximum transmission range, but also based...
Several problems related to communication among Mobile Ad-hoc NETworks (MANETs) devices can be faced making use of formal models. Among these, Petri Nets are particularly suitable for modeling dynamic and transitional systems. The tool DEMONE models the behavior of each host in a MANET through a Petri Nets extension, so that it allows the analysis of some interesting computational activities and the...
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile terminals that are able to dynamically form a temporary network without any aid from fixed infrastructure or centralized administration. In recent years, MANETs are continuing to attract the attention for their potential use in several fields such as military activities, rescue operations and time-critical applications. In this paper,...
Lack of well-defined defense perimeter in MANETs prevents the use traditional firewalls, and requires the security to be implemented in a distributed manner. We recently introduced a novel deny-by-default distributed security policy enforcement architecture for MANETs by harnessing and extending the concept of network capabilities. The deny-by-default principle allows compromised nodes to access only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.