42,916 research outputs found
Secured Scheme for Privacy Preserving and Node Authentication Mechanism for a Special Mobile Ad hoc Network
Opportunistic networks are a special type of Mobile Ad hoc network which are wirelessly interlinked nodes with the absence of end to end connectivity. All nodes in an opportunistic network are free to move in an environment. Due to the high degree of mobility of nodes, opportunistic networks differ significantly from the existing traditional networks and it works on store, carry &forward mechanism in which, each node has a communication range. Within its proximity, if any node comes, it can send and receive messages. In an opportunistic network, there is no proper infrastructure available for communication and node have limited storage and computational capabilities. The major problem being faced in an opportunistic network is the identification of normal and malicious nodes because due to the open nature of the opportunistic network, malicious nodes also can join the network and perform some malicious activities like Sybil attack. We propose a remedy to address the authentication and privacy issue that can arise in an opportunistic network. According to the findings of the simulation, the proposed research work satisfies the authentication and privacy criteria of an opportunistic network
An Empirical Study of Destructive Nodes Characterization in Wireless Networks
Mobile Ad hoc Networks (MANETs) are deployed in various new public and domestic environments, going up to new needs in terms of concert and effectiveness. According to the wireless dynamic nature, some needed services like security for network maintenance, trust-based routing and resource management among network nodes are not carried out as good as expected. Also, the ad-hoc networks are vulnerable to secure communications and multiple attacks can participate in various layers of a network stack. Destructive nodes have chances to change or discard routing specifications, sometimes it can send false routes to capture source data packets to pass through themselves. Some protocols have been designed to address the complication from secure data communication. Even though, a secure protocol cannot handle all kinds of attack detection and elimination in all situations. New secure data communication wireless protocols need to focus these challenges, because security care is not natively built in MANET. Therefore, in this research paper, analysis of destructive nodes characterization and impacts on wireless networks investigated the multiple attacks behaviour, activities of the attacks all through neighbour selection, path establishment from source to destination, creating awareness of attack presence detection knowledge to the normal devices during path discovery and data transmission mechanisms. Legitimate nodes need to be building with secure transmission knowledge to make sure trusted communication, ensure validation, honesty, and privacy to classify the attacks in MANETs
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
Security Analysis of Vehicular Ad Hoc Networks (VANET)
Vehicular Ad Hoc Networks (VANET) has mostly gained the attention of today's
research efforts, while current solutions to achieve secure VANET, to protect
the network from adversary and attacks still not enough, trying to reach a
satisfactory level, for the driver and manufacturer to achieve safety of life
and infotainment. The need for a robust VANET networks is strongly dependent on
their security and privacy features, which will be discussed in this paper. In
this paper a various types of security problems and challenges of VANET been
analyzed and discussed; we also discuss a set of solutions presented to solve
these challenges and problems.Comment: 6 pages; 2010 Second International Conference on Network
Applications, Protocols and Service
- …