Filters








10,396 Hits in 5.4 sec

Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Rene Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger
2003 Electronical Notes in Theoretical Computer Science  
Security and privacy in mobile ad-hoc peer-to-peer environments are hard to attain, especially when working with passive objects without own processing power.  ...  In this paper, we will focus on privacy and security aspects of ad-hoc, peer-to-peer networks within the SmartInteraction project.  ...  Privacy and Security in mobile ad-hoc networks Motivation For pervasive computing environments in general, security is an important issue because the possibilities for attacks are enormous.  ... 
doi:10.1016/s1571-0661(04)80687-x fatcat:nx6tkmfcfrhatidwripum55rii

Ad-hoc Community Composition of Rescue Forces in Action Situations

Volkmar Schau, Kathrin Kirchner, Christian Erfurth, Gerald Eichler
2010 International Conference on Innovations for Community Services  
Secure energy and transport networks, Internet and telecommunications, are vital nerves of our highly networked society.G lobal mobility makes it difficult to combat and natural disasters and technological  ...  "SpeedUp project" howt o present asolution for ad-hoc communication, situation-aware representation, tracking and guiding in dynamic inhomogeneous communities. 1M otivation Mostly unexpected events likenatural  ...  Mobile Agent Mobile Ad-hoc Networks In general, mobile ad-hoc networks (MANET) are communication networks built up of a collection of mobile devices which can communicate with each other via wireless connections  ... 
dblp:conf/iics/SchauKEE10 fatcat:mnvkcnuab5fo5cey7qfajoklfm

Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)

Rakesh KumarSingh, Rajesh Joshi, Mayank Singhal
2013 International Journal of Computer Applications  
In this research paper, we will identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks.  ...  This research paper will provide an overview about the security issues and available detection techniques in Mobile ad hoc networks.  ...  Because mobile ad hoc networks have far more vulnerabilities than the traditional wired networks, security is much more difficult to maintain in the mobile ad hoc network than in the wired network.  ... 
doi:10.5120/11568-6871 fatcat:vvludfglabdrpdppxvdbagf7di

MANET: Types, Tools, Applications, Challenges & Security Attacks

Saranya A, Rajasekaran K, Selin Chandra CS
2015 International Journal of Communication and Networking System  
MANET is a rapidly emerging mobile communication technology which offers fruitful services in various fields like military battle field, emergency services, entertainment, sensor networks, home and internetworking  ...  etc., Due to dynamic topology, open environment, infrastructure less network and lack of centralized administration MANETs are susceptible to various attacks.  ...  Since mobile ad-hoc network works in an open environment it is vulnerable to many active and passive attacks. II.  ... 
doi:10.20894/ijcnes.103.005.001.005 fatcat:ewh2h3thlvfivk3nbjyljigur4

Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol For MANETS

Dr. K.Soumya, Prof. S. P. Setty
2019 International Journal of Wireless & Mobile Networks  
Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities  ...  The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks.  ...  A mobile ad hoc network (MANET) is a special kind of wireless ad hoc network in which autonomous mobile nodes connected by wireless links. A sample MANET is shown in figure 1.  ... 
doi:10.5121/ijwmn.2019.11101 fatcat:62syxz3ghrbctekifdibypnszi

Improvement of Service Discovery Algorithm Using Tree-based Architecture in Ad-hoc Grid Environment

Maysam Hedayati
2013 Advances in Networks  
We'll show that having a directory in ad hoc gird network isn't useful, so we need to have a set of directories.  ...  One of the important problems in ad hoc grid environment is service discovery.  ...  In recent trends, more and more research efforts are dedicated towards deployment of peer-to-peer networks in the context of mobile ad hoc networks (MANETs).  ... 
doi:10.11648/j.net.20130101.12 fatcat:fjm76yhqe5godd47spri5uerru

Grid of Security: A New Approach of the Network Security

Olivier Flauzac, Florent Nolot, Cyril Rabat, Luiz-Angelo Steffenel
2009 2009 Third International Conference on Network and System Security  
Like this, we can secure both ad-hoc, local-area or enterprise networks in a decentralized manner, preventing the risk of a security breach in the case of a failure.  ...  In this paper, we present a new approach to deploy a distributed security solution where communication between each device can be control in a collaborative manner.  ...  Secure ad-hoc networks An ad-hoc network is a network without fixed infrastructure in which each device can communicate with its neighbors.  ... 
doi:10.1109/nss.2009.53 dblp:conf/nss/FlauzacNRS09 fatcat:u6d6r3nldzgvteh3rmjnwhyenm

A Novel Approach of Service Discovery Based on Tree Di-Rectory Architecture in Ad-Hoc Grid

Maysam Hedayati
2013 Advances in Networks  
We'll show that having a directory in ad hoc gird network isn't useful, so we need to have a set of directories.  ...  One of the important problems in ad hoc grid environment is service discovery.  ...  In recent trends, more and more research efforts are dedicated towards deployment of peer-to-peer networks in the context of mobile ad hoc networks (MANETs).  ... 
doi:10.11648/j.net.20130101.11 fatcat:4mpfylcq6zctnopd32ug6pjl54

Security Aspects and Challenges in Mobile Adhoc Networks

G. Jose Moses, P.Suresh Varma, N. Supriya, G. NagaSatish
2012 International Journal of Computer Network and Information Security  
The Adhoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium and network topology.  ...  Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment.  ...  To secure an ad hoc network, we consider the following attributes 1) Availability: Ensures survivability despite Denial Of Service (DOS) attacks.  ... 
doi:10.5815/ijcnis.2012.06.04 fatcat:belyeqnmard3hlxbmbdtf474au

Security Threats in Mobile Ad Hoc Network

Anuj Joshi, Pallavi Srivastava, Poonam Singh
2015 SAMRIDDHI A Journal of Physical Sciences Engineering and Technology  
In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer.  ...  Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links.  ...  ACKNOWLEDGMENT First and foremost, I would like to express my heartiest gratitude to honorable Asst. Prof. Dr.  ... 
doi:10.18090/samriddhi.v1i2.1588 fatcat:5245bkyig5abhfdc5uw724py6e

Special Issue on Broadband Wireless Networking

2006 Journal on spesial topics in mobile networks and applications  
His research focuses on mobility and resource management in interconnected wireless/wireline networks, UWB wireless communications systems, wireless security, and ad hoc and sensor networks.  ...  In the first paper BA macro model of frequently changing mobile networks to perform flow and access control,'' Maxemchuk and Zhou present a model for mobile ad hoc networks that combines the individual  ... 
doi:10.1007/s11036-006-7792-y fatcat:j2okpfa3unbsljllin7cf2ufiq

AmbientTalk: Object-oriented Event-driven Programming in Mobile Ad hoc Networks

Tom Van Cutsem, Stijn Mostinckx, Elisa Gonzalez Boix, Jessie Dedecker, Wolfgang De Meuter
2007 XXVI International Conference of the Chilean Society of Computer Science (SCCC'07)  
In this paper, we describe AmbientTalk: a domainspecific language for orchestrating service discovery and composition in mobile ad hoc networks.  ...  AmbientTalk is a distributed object-oriented programming language whose actor-based, eventdriven concurrency model makes it highly suitable for composing service objects across a mobile network.  ...  E is designed for writing secure peer-to-peer distributed programs for open networks, but not specifically for mobile ad hoc networks.  ... 
doi:10.1109/sccc.2007.12 dblp:conf/sccc/KalinowskiT07 fatcat:qi4gmsnkcjbjde4qffhbtdcrtq

AmbientTalk: Object-oriented Event-driven Programming in Mobile Ad hoc Networks

Tom Van Cutsem, Stijn Mostinckx, Elisa Gonzalez Boix, Jessie Dedecker, Wolfgang De Meuter
2007 Chilean Computer Science Society (SCCC), Proceedings of the International Conference of the  
In this paper, we describe AmbientTalk: a domainspecific language for orchestrating service discovery and composition in mobile ad hoc networks.  ...  AmbientTalk is a distributed object-oriented programming language whose actor-based, eventdriven concurrency model makes it highly suitable for composing service objects across a mobile network.  ...  E is designed for writing secure peer-to-peer distributed programs for open networks, but not specifically for mobile ad hoc networks.  ... 
doi:10.1109/sccc.2007.4396972 fatcat:hx3iywfcsfgs7dkuufmk2vxe6u

Prevention of Flooding Attacks in Mobile Ad Hoc Networks [chapter]

Gurjinder Kaur, V. K. Jain, Yogesh Chaba
2019 Wissen, Kommunikation und Gesellschaft  
In this, we focus on significant security attacks in Mobile ad hoc networks. MANET has no clear immunity so; it is available to both legitimate users and malicious attackers.  ...  Mobile ad-hoc network can operate in isolation or in coordination with a wired infrastructure.  ...  Types of Security Attacks Mobile Ad hoc networks are vulnerable to various attacks not only from outside but also from inside i.e. network itself.  ... 
doi:10.1007/978-3-030-11437-4_15 dblp:conf/widecom/KaurJC19 fatcat:zayu67o3xfb67dpg4tohze5rmu

Identifying malicious behavior in MANET through data path information

Danai Chasaki
2014 2014 International Conference on Computing, Networking and Communications (ICNC)  
Mobile Ad-hoc Networks are increasingly deployed in military networks as well as special kinds of civil law enforcement and emergency operation domains.  ...  In this paper, we develop a scheme that allows us to track and validate mobile node connectivity in order to identify potential malicious behavior.  ...  RELATED WORK Security for mobile ad hoc network is an active area of research.  ... 
doi:10.1109/iccnc.2014.6785398 dblp:conf/iccnc/Chasaki14 fatcat:lqnoxmg7lbfh3oxa2mdxrncaj4
« Previous Showing results 1 — 15 out of 10,396 results