The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data...
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt...
Wireless Sensors Networks (WSNs) have been gaining significant attention in both the industries and the academia in recent years. However, WSN are vulnerable to growing security threats and attacks which are inept for the current traditional security mechanisms to cope with or mitigate such security challenges. As a solution, Software Defined Network (SDN) has emerged and been merged with WSN to form...
With the rapid development of the Internet, people are not satisfied with sharing information only on the local network; instead, they intend to maximize the use of various types of network resources in different regions in the world. Intelligent network increasingly strong demand, put forward new demands on intelligent routing protocol. Intelligent routing protocol model not only need to have self...
Vehicular Ad-hoc Networks (VANETs) is a research area focusing on improving road safety and traffic management. However, VANETs are still vulnerable to different kind of security attacks due to its infrastructure-less networking. Sybil Attack is a well-known attack in VANET. It forges multiple nodes with different identities to broadcast fake messages to manipulate the road traffic and information...
In this article, we propose to use game theory to model our WSN network. In this setting, the goal of the compromised node is to keep disrupting the network while remaining alive. The game studied is a two-player quantitative infinite game on a finite graph, where each transition can change some energy levels and some reward. The goal of the compromised node is hence to maximize its reward while maintaining...
This paper focuses on the security issue in Cyber-Physical Systems. The sensor transmits the state estimation information to the remote controller via wireless networks. Due to the broadcast characteristics of wireless communication, the systems are vulnerable to the eavesdropping attacks and jamming attacks. In this paper, we study how to maximize the secure transmission rate between sensors and...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
We consider a wireless network of M nodes connected together in a decentralized way (for example as an ad hoc network), and according to pre-specified rules. There are other malicious node(s) which can be either inserted or infected which are trying to disturb the operation of the network. The nodes are cooperating to defend the network (and eventually themselves) by isolating the misbehaved node(s)...
This paper specifies and focuses on a scheme for manage the authorized nodes after distribute and manage the keys for group in ad-hoc environment i.e. the rejoining of authorized nodes in any cause of failure for acceptance of new key from the round leader. It is applied to the Secure OLSR Protocol. This problem loses the group management efficiency. The overall objective of this paper is to make...
With the advancement of mobile devices, a new paradigm called opportunistic sensor networks emerges which has a lot of applications, such as Military surveillance, disaster relief, search and rescue, vehicle tracking and much more. Opportunistic Sensor Network (OSN) has become one of the actively researched areas motivating researchers to come up with routing strategies and securing the routing with...
Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While...
Energy saving is the main concern in mobile ad hoc network to improve network lifetime. To design a secure geographic routing protocol with data compression, boundaries of mobile ad hoc nodes have been considered. AODV is the basis for SMHSP (Secured multi hop strong path protocol) protocol. AODV refers to Ad hoc on demand distance vector, a routing protocol designed for wireless and mobile ad hoc...
The number of on-road vehicles has increased by almost 140% over the past decade, thereby increasing pollution levels, congestion and fuel consumption. To contain such a situation, Vehicular Ad-Hoc Network (VANET) technology is almost on the verge of large scale practical deployment. Hence, the aim is to provide a system to control the above using VANET and to provide an infrastructure to reduce the...
The use of recommendation in trust-based models has its advantages in enhancing the correctness and quality of the rating provided by mobile and autonomous nodes in MANETs. However, building a trust model with a recommender system in dynamic and distributed networks is a challenging problem due to the risk of dishonest recommendations. Dealing with dishonest recommendations can result in the additional...
Wireless sensor network will become isolated in various associated segments because of the disappointment of some of its hubs, which is known as a “cut”. In this paper, authors acknowledge the issue of distinguishing cuts by the remaining hubs of a wireless sensor network. System proposes an estimation which grants every hub to identify at the time of accessibility to an extremely assigned hub has...
In this paper, we propose a secure transmission protocol for two users exchanging their respective information in an n-hop MIMO Ad hoc network. By exploiting the properties of the transmission medium in the physical layer, three channel models are utilized to provide secure transmission, namely one-way relay channel, two-way untrusted relay channel, and multiple access channel. Using these channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.