The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To detect and isolate the misbehaving nodes in MANETs, reputation-based security schemes have been developed. These schemes either utilize only first-hand (direct) information or both first-hand and second-hand (direct) information, to compute the trustworthiness of nodes. Both of the aforementioned categories have their own strengths and weaknesses under different network conditions and scenarios...
Routing in vehicular ad-hoc network is current area of research due to fast mobility of vehicles. A new route in very less time has to be developed to communicate with the base station. If any node behaving like malicious and creates attack on network, than whole communication will be squeeze. This paper presents a routing strategy to prevent from attack and identify the malicious node. The strategy...
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed...
A variety of solutions have been proposed for detecting and preventing IP hijack attacks. Despite potentially serious consequences these solutions have not been widely deployed, partially because many ISPs do not view their risk as large enough to warrant investment. Nevertheless, a number of organizations such as critical national infrastructure are at a very high risk level and require a deployed...
WSN (Wireless Sensor Network) has a wide range of applications. As a result, security problems become increasingly important. We investigate the problem of minimising the failure rate of packet delivery in the presence of the modification attacks and the selective forwarding attacks in a static WSN with one base station without using expensive encryption/decryption algorithms. We propose a novel heuristic...
Vehicular Ad Hoc Network (VANET) is a challenging area of research in the field of vehicular technology. It is an emerging topic for its high mobility and high link disruption. But if link disruption is due to the malicious drivers in the network then it reduces the performance of the network. Hole Generation attack is a kind of attack in which the malicious drivers breaks the communication links...
Vehicular Ad Hoc Network (VANET) is an emerging area of research to provide Intelligent Transportation System (ITS) services to the end users. It is a challenging topic for its high mobility and frequent link disruption. Recently researchers are working on many specific issues related to VANET like routing, broadcasting, Quality of Service (QoS), security, architectures, applications, protocols, etc...
Unlike the conventional routing techniques in the Internet where routing privileges are given to trustworthy and fully authenticated nodes, Delay Tolerant Networks (DTNs) allow any node to participate in routing due to the lack of consistent infrastructure and central administration. This creates new security challenges as even authorized nodes in DTNs could inject several malicious threats against...
In this paper, a series of novel secure dynamic routing protocols are proposed to provide the end-to-end security. Unlike the existing dynamic routing protocols with security consideration which focus on a certain specific network threat, in the paper the proposed approach is based on a comprehensive network security evaluation framework. By analyzing the threats, vulnerabilities, countermeasures,...
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with serious security concerns, in particular from a wireless transmission medium perspective where such networks may be subject to data tampering and dropping attacks. This paper enhances a recently...
Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various environments. One such network that has received a lot of interest in the last couple of years is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, standardization, and development...
With the rapid development of mobile ad hoc network, security and trust are important to the network, especially for military ad hoc network. Trust routing scheme is the main issue in military ad hoc network. Trust routing is related to many factors such as routing hop number, node information integrity degree and node behavior. To use multi-source information, multi-agent collaboration method is...
We present a peer-to-peer based storage system and evaluate its resistance in the presence of malicious peers. To do so, we resort to simulation of the actual code borrowed from the production system. Our analysis allows to identify the main threats, prioritise them and propose directions for mitigating the attacks.
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
As the applications of Wireless Sensor Networks proliferate, security issues raised in this uncontrolled, self-organised systems comprising a large number of nodes with very low processing, buffering and communication capabilities become mandatory as they need to cooperate with each other, even for routing data messages to the desired destination. A solution that has been widely pursued to detect...
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As...
The following topics are dealt with: vehicular networking; beaconing and broadcast; data collection and management; simulation and modelling; transport protocols; mobility management in VANETs; telecommunication security; smart antennas and radio; reliability and routing; cellular networks; physical layer; and MAC.
Most Distributed Hash Tables (DHTs) inherently assume interconnecting nodes with homogeneous capabilities. Realistically however, capabilities of nodes on a network widely vary, leading traditional DHTs to inevitably exhibit poor performance in real-world environments. Stealth DHT was previously proposed to address node heterogeneity by enabling a DHT to separate highly capable (super-peers or service)...
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bushfire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unattended which causes serious security concerns. Insecure...
In this paper, we propose a new Dynamic Reputation Evaluation Model (DREM) to meet the requirement of characteristics and security in hierarchical Ad Hoc networks. In this model, the reputation relationship is defined with the consideration of related node roles and functions, and the reputation evaluation mechanism is built based on the correlation among nodes to evaluate and update the reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.