The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R&E) project, “Smoke Screen...
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the...
The Internet of Things (IoT) is expected to pervasively interconnect billions of devices, denoted as “smart objects”, in an Internet-like structure, which will extend the current Internet, enabling new forms of interactions between objects based on social relationships. In such a scenario, security is a difficult and challenging task, and proper mechanisms should be defined without introducing too...
Railways constitute a main means of mass transportation, used by public, private, and military entities to traverse long distances every day. Railway control software must collect spatial information and effectively manage these systems. Wireless sensor networks (WSNs) are an attractive solution to cover the area along-side the railway routes. In-carriage WSNs are also studied in cases of dangerous...
BitTorrent is a popular application for peer-to-peer file sharing in today's Internet. To achieve robust and efficient data dissemination as an application overlay, BitTorrent implements a data-centric paradigm on top of TCP/IP's point-to-point packet delivery, which requires each peer to obtain network layer connectivity information (e.g., peer IP address, distance to each peer, routing policies)...
In conventional wireless sensor networks (hereinafter referred to as WSNs), the single sink node model has been employed to collect and store the measured data that can be accessed by external users of WSNs. However, the single sink model of WSNs can be the single point of failure for some usage. To counter this problem, we can employ multiple gateway-based WSNs. In addition, WSNs are susceptible...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data...
Mobile Ad hoc Network has a wide range of applications in military and civilian domains. It is generally assumed that the nodes are trustworthy and cooperative in routing protocols of MANETs viz. AODV, DSR etc. This assumption makes wireless ad hoc network more prone to interception and manipulation which further open possibilities of various types of Denial of Service (DoS) attacks. In order to mitigate...
Embedded System Reconfigurability has begun since few years thanks to the FPGA capabilities. Many approaches and methodologies have been adopted in literature. Several tools were proposed to designers, but a big luck of efficiency has been noticed. So several works studied this concept and still looking for the best tools and flow. This paper presents an overview of Reconfigurability concepts and...
MANETs are an upcoming technology that is gaining momentum in recent years. Due to their unique characteristics, MANETs are suffering from wide range of security attacks. Wormhole is a common security issue encounter in MANETs routing protocol. A new routing protocol naming extended prime product number (EPPN) based on the hop count model is proposed in this article. Here hop count between source...
Delay (or disruption) tolerant networks (DTNs) have widely studied as promising technology for providing communications in environments where all nodes are not connected with each other. Assuming the existence of adversary nodes, in this study we evaluate effectiveness of erasure-code-based DTN routing in terms of secure transmission. We combine secret-sharing-based multi-path routing with several...
The flow of information among people through electronic devices has undeniably become an important aspect of many human lives. The importance of the Internet has grown in time to settle on almost even grounds with electricity. Here, we present a novel hybrid approach to opportunistic wireless networking. The main objective of our work was to propose a system with a feature-set attractive for real...
Mobile ad hoc network (MANET) is a technology of spontaneous creation of ad hoc network for data exchange, in which nodes can act as end nodes or can act as router. In hostile environment some node may deny to forward packet in order to disrupt regular communications, this type of abnormal behavior is referred as packet drop attack or blackhole attack. Most of the techniques that are used to mitigate...
Routing in cognitive radio networks (CRNs) faces many limitations that make it challenging. First, traditional routing protocols cannot be directly applied in CRNs because they consider fixed frequency band. Second, cognitive radio enables dynamic spectrum access which causes adverse effects on network performance. Third, effective routing in CR Networks (CRNs) needs local and continual knowledge...
New generation radio equipment, used by soldiers and vehicles on the battlefield, constitute ad hoc networks and specifically, Mobile Ad hoc NETworks (MANET). The battlefield where these equipment are deployed includes a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANETs links. Operational communications...
Security in wireless sensor networks is critical due to its way of open communication. In this paper we have provided a solution to detect malicious nodes which perform radio transmission power control attack and sinkhole attack in wireless sensor networks. In the proposed approach, data transmission is divided into multiple rounds of equal time duration. Each node chooses the parent node in the beginning...
Privacy is considered as one of the hottest issues in nowadays communication research areas. It focuses on protecting the content of the transmitted data and on preserving the contextual information such as the identity of the communicating entities. This paper presents an overview of research done in this area in order to build a foundation that helps the research community to understand more the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.