The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Ad hoc Network has a wide range of applications in military and civilian domains. It is generally assumed that the nodes are trustworthy and cooperative in routing protocols of MANETs viz. AODV, DSR etc. This assumption makes wireless ad hoc network more prone to interception and manipulation which further open possibilities of various types of Denial of Service (DoS) attacks. In order to mitigate...
In deep waters, both the natural acoustic systems (such as marine mammals) and artificial acoustic systems (like underwater sensor networks (UWSNs) and sonar users) use acoustic signals for communication, echolocation, sensing, and detection. This makes the channel spectrum, heavily shared by UWSNs posing several salient features such as narrow bandwidth, long propagation delay, and high packet loss...
Advancement of medical science brings together new trend of proactive health care which gives rise to the era of Wireless Body Area Networks (WBAN). A number of issues including energy efficiency, reliability, optimal use of network bandwidth need to be considered for designing any multi-hop communication protocol for WBANs. Energy consumption depends on many factors like amount and frequency of forwarding...
Intelligent Transport Systems (ITS) and the open-ended research in the field of vehicular communication attempts to deal with the road traffic problems. In Vehicular Ad-Hoc Networks (VANETs), vehicles are moving faster in comparison with Mobile Ad-hoc Networks (MANETs). Furthermore, in urban VANETs, vehicles are constrained by the layout of the roads and buildings, which causes shadowing effects....
The article presents an analysis of the problem of correct network interaction, based on BGP routing protocol. It analyzes the main attacks on information systems, due to the use of this protocol. Scenario of typical attack is presented. Basic measures to prevent information security threats when using the BGP protocol are offered.
While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the efficient and secure delivery of data CRCMD&R...
Wireless sensor networks for rarely occurring critical events must maintain sensing coverage and low latency network connectivity to ensure event detection and subsequent rapid propagation of notification messages. Existing geographic forwarding algorithms have proved successful in providing energy efficient network connectivity for arbitrary topologies where sensing coverage is not guaranteed. This...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
Wireless sensor networks are comprised of a group of nodes, which are randomly distributed in an environment. Since the energy consumptions of nodes are limited in these networks, data should be collected and sent optimally and in an energy-efficient way. The available routing protocols are used to send data in this way. The main responsibility of these protocols is to reduce energy consumption and...
Sensor nodes collect the data from the environment and send to sink. But attackers corrupt data while transmitting therefore data security is main concern of wireless sensor network (WSN). In proposed protocol, we decrease the passive attack on sink node by decreasing the traffic on sink node. The simulation results demonstrates the proposed method can each node will compress their data before sending...
Underwater Wireless Sensor Network (UWSN) is emerging lots of attention due to its various types of characteristics and applications. Distinctive underwater characteristics leads to many challenges such as-high propagation delay, data losses, nodes mobility, localization, nodes deployment while designing any reliable and efficient routing protocol. In this paper, an extension of CDBR (Forwarding nodes...
Industrial low-power wireless mesh standards, suchas IEEE802.15.4-TSCH, WirelessHART and ISA100.10a, offerwire-like end-to-end reliability and a decade of battery lifetime. These technologies have become de-facto standards, used inthe most demanding applications such as industrial processmonitoring. In this paper, we explore what it takes to go fromindustrial process monitoring to industrial process...
Software-Defined Networking (SDN) is a recent model of networking architecture which splits the network control from data forwarding functions. Most SDN solutions have in their scope the wired networks, but more recently, some attempts have been made to adapt SDN architecture for the context of wireless mesh networks (WMNs). In the present paper, we examine whether the use of the SDN paradigm in WMNs...
This paper studies the fault management in mobile ad hoc networks. We focus on schemes which provide the robustness in MANETs: service restoration and service protection. Firstly, we propose an analytical comparison of service restoration, in terms of restoration time, at the routing layer (reactive and proactive protocols). Service restoration with reactive protocol is the most suitable in MANETs...
The design of a trust management framework in a mobile ad hoc network and its various components to protect against different attacks has a significant impact upon the performance of the secure routing protocol which is meant to form the most reliable route for data delivery. Specifically, the current work focuses upon the impact of certain parameters specific to two components within the proposed...
Low Power and Lossy Networks (LLNs), as it covers a wide scope of applications, such as building automation, industrial control, healthcare etc., has received considerable attention in recent years. In many LLNs applications, Point-to-point (P2P) communication is crucial, which extremely need to be supported by reliable and energy- efficient routing protocols. However, traditional routing protocols...
To solve the problem that the current routing protocols in MANET cannot be used in AANET (Aeronautical Ad Hoc Networks), we propose the Hierarchical Space routing protocol (HSRP). Section 1 of the full paper gives five definitions that we have come up to find useful in describing HSRP protocol. Section 2 uses the above-mentioned five definitions to design the HSRP protocol; the HSRP protocol has the...
It does not seem easy to generate reliable routes in Vehicular Ad-hoc Networks (VANETs) because of frequent link failures caused by vehicle's mobility. In this regard, we analyze the characteristics of topology-based routing protocols in order to assess the feasibility of each protocol for vehicular environments. We plan to design an efficient routing protocol for VANETs in order to generate reliable...
Mobile Ad Hoc network works in hostile environment in absence of central control. Malicious or low energy nodes may degrade performance and also affects lifetime of the network. Broadcasting method which is commonly used for maintaining connectivity causes high overhead on the network. So it is necessary to exclude malicious and low energy nodes from the network and reduce the overhead. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.