Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








942 Hits in 6.1 sec

Secret Common Randomness From Routing Metadata in Ad Hoc Networks

Mohammad Reza Khalili-Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng
2016 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a secret-common-randomness establishment algorithm for ad hoc networks, which works by harvesting randomness directly from the network routing metadata, thus achieving both pure  ...  Index Terms-Ad hoc mesh network, dynamic source routing, common randomness, secret key establishment, minimum entropy.  ...  in a mobile ad-hoc network.  ... 
doi:10.1109/tifs.2016.2550424 fatcat:cfxsixlcivazhhmubzcb3yodfy

SECRET COMMON RANDOMNESS FROM ROUTING METADATA IN AD-HOC NETWORKS

S Sathyalakshmi, M Scholar
2017 Scope International Journal of Science, Humanities, Management and Technology   unpublished
The main aim is to reduce the battery power consumption where Power is the most important criteria in ad-hoc networks.  ...  The goal of this research is to reduce the energy consumption and to improve the quality of service (QoS) of ad hoc and mobile networks.  ...  It discuss about the routing protocol, where the routing information could be used for establishing secret common randomness between any two devices in a mobile ad-hoc network.  ... 
fatcat:ewcaomahdfbxjm5myoevor5w6y

A Privacy Preserving and Efficient Randomness Routing in Adhoc Wireless Network

G.Asha Jyothi Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
In the ad hoc networks another concepts is routing from source node to destination node.  ...  By using public key based algorithm we can automatically generated secret key any two devices in the network. So that by performing this process we can randomly generate secret key.  ...  It discuss about the routing protocol, where the routing information could be used for establishing secret common randomness between any two devices in a mobile ad-hoc network. Related Work P.  ... 
doi:10.17762/turcomat.v12i3.2224 fatcat:o2qlhn7u6jarvijunvhrb67hve

Routing protocol based key management schemes in manet: a survey

Shibu K.R, Suji Pramila R
2018 International Journal of Engineering & Technology  
Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET).  ...  Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time.  ...  This information is having some inherent randomness and it is used as the source for the randomness. Dynamic source routing DSR is a well known protocol designed for wireless ad-hoc network.  ... 
doi:10.14419/ijet.v7i3.14219 fatcat:733exqdllrc6fpyvdf4worojhm

KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs [article]

Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng
2015 arXiv   pre-print
In this paper, we propose KERMAN, an alternative key establishment algorithm for ad-hoc networks which works by harvesting randomness directly from the network routing metadata, thus achieving both pure  ...  Establishing secret common randomness between two or multiple devices in a network resides at the root of communication security.  ...  in a mobile ad-hoc network.  ... 
arXiv:1504.03744v1 fatcat:p5j2jh45knfbdbi4otdlf42w4e

A Novel Secret Key Generation Scheme for MANETs using Traffic Load to Avoid Active Attackers

Shibu K.R
2020 International Journal of Emerging Trends in Engineering Research  
Symmetric key encryption techniques are the base of providing security in Mobile ad-hoc network (MANET) communication.  ...  The system proposed here is simulated with two different routing environments: DSR and AODV. These two are similar in their on-demand nature of routing but differ in many ways.  ...  The common approaches are to encrypt the data with a random binary sequence generated using random number generators or secret key generation algorithms.  ... 
doi:10.30534/ijeter/2020/11852020 fatcat:ebd2wak63nh7bioovsi6lqdx7i

Epidemic Models, Algorithms, and Protocols in Wireless Sensor and Ad Hoc Networks [chapter]

Pradip De, Sajal K. Das
2008 Algorithms and Protocols for Wireless Sensor Networks  
Section 4 illustrates several reprogramming and code update protocols in sensor networks that adopt epidemic theoretic principles. In Section 5, we look into epidemic protocols in ad hoc networks.  ...  In this chapter, we address the modeling techniques, algorithms and protocols proposed in wireless sensor and ad-hoc networks that are primarily based on Epidemic Theoretic concepts and paradigms.  ...  Epidemic Routing The authors in [4] introduce epidemic routing for partially connected ad-hoc networks where pair-wise exchanges of messages among mobile hosts in a random manner ensure the eventual  ... 
doi:10.1002/9780470396360.ch3 fatcat:tb2qln4ijzfynppmxzk4vdfjpu

Secure Trust Metadata Management for Mobile Ad-Hoc Networks [chapter]

Vivek Natarajan, Yi Yang, Sencun Zhu
2012 Lecture Notes in Computer Science  
A trust management framework is useful to ensure proper functioning of a mobile ad-hoc network (MANET).  ...  The TA can send queries of various types in the network to obtain the trust metadata of its interest.  ...  Conclusion and Future Work In this paper, we propose an in-network secure trust metadata management scheme for a mobile ad-hoc network.  ... 
doi:10.1007/978-3-642-35130-3_12 fatcat:ilq7xm5cqjev3g2ui6bvqvkdgm

Load Based Key Generation for MANETs with DSR and AODV Routing Techniques

2020 International Journal of Engineering and Advanced Technology  
In this paper, an efficient secret key establishment technique using traffic matrix is simulated in the two reactive routing protocol scenarios: DSR (Dynamic Source Routing) and AODV (Ad hoc On-demand  ...  Automatic key establishment schemes are the root of secure communication in Mobile adhoc networks(MANETs).  ...  The scheme is extracting the randomness source from the system metadata: the traffic load and the routing table.  ... 
doi:10.35940/ijeat.c4752.029320 fatcat:5irliwxxizgbdp52dorkkrwveu

Security and privacy issues in middleware for emergency and rescue applications

Matija Puzar, Thomas Plagemann, Yves Roudier
2008 2008 Second International Conference on Pervasive Computing Technologies for Healthcare  
Moreover, the rescue personnel's movements make the network topology very dynamic and unstable. We call this type of networks mobile ad-hoc networks (MANETs).  ...  If computer networks were actively used by the rescue personnel, it would allow for more efficient communication, and information sharing in general, compared to standard walkie-talkies still in use today  ...  Acknowledgments This work has been performed in the Ad-Hoc InfoWare project and we would like to thank all project team members and related colleagues for many fruitful discussions and other contributions  ... 
doi:10.1109/pcthealth.2008.4571037 dblp:conf/ph/PuzarPR08 fatcat:xqkyel3klbeshcphmky7e5itku

Neurons, viscose fluids, freshwater polyp hydra-and self-organizing information systems

F. Heylighen, C. Gershenson, S. Staab, G.W. Flake, D.M. Pennock, D.C. Fain, D. De Roure, K. Aberer, Wei-Min Shen, O. Dousse, P. Thiran
2003 IEEE Intelligent Systems  
This work is partially supported by research grants from the Airforce Office of Scientific Research.  ...  Acknowledgments This work was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems, which the Swiss National Science Foundation supports under  ...  As such, a CDMA code might be difficult to use in selforganized ad hoc networks.  ... 
doi:10.1109/mis.2003.1217631 fatcat:qm2r6vmijrcc7f742j4oivfgui

Securing Ad Hoc Storage through Probabilistic Cooperation Assessment

Nouha Oualha, Yves Roudier
2008 Electronical Notes in Theoretical Computer Science  
A protocol for determining the availability of data stored in an ad hoc fashion is detailed.  ...  This setting, combined with the high churnout of nodes and with the high chances of network partition, particularly in mobile ad hoc systems, makes it quite uneasy to ensure the long-term availability  ...  A typical multi-hop mobile ad hoc network consists of mobile nodes which communicate with each other through multiple routes.  ... 
doi:10.1016/j.entcs.2008.05.003 fatcat:kheajd3kvvf6hcfbk5bld6qvla

Hadoop MapReduce for Mobile Clouds

Johnu George, Chien-An Chen, Radu Stoleru, Geoffrey Xie
2016 IEEE Transactions on Cloud Computing  
., caused by unexpected device failures or topology changes in a dynamic network).  ...  Building Hadoop on a mobile network enables the devices to run data intensive computing applications without direct knowledge of underlying distributed systems complexities.  ...  The default Map-Reduce task scheduling in a mobile ad-hoc network is essentially a random task allocation.  ... 
doi:10.1109/tcc.2016.2603474 fatcat:2kdyoj2xefeztc3yt2akk5bqo4

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world.  ...  This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey.  ...  A cooperative intrusion detection system for ad hoc networks. In SASN '03: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks (pp. 135-147). New York: ACM. 60.  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

Darren Hurley-Smith, Jodie Wetherall, Andrew Adekunle
2017 IEEE Transactions on Mobile Computing  
The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasingly popular in a wide range of use cases.  ...  To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both.  ...  This topology generation service is offered by a variety of Mobile Ad hoc Network (MANET) routing routing and data security protocols. Section 5 draws conclusions from the research findings.  ... 
doi:10.1109/tmc.2017.2649527 fatcat:bzmwegilprfdpe7jcspwc2fx3u
« Previous Showing results 1 — 15 out of 942 results