2021
DOI: 10.3390/s21072355
|View full text |Cite
|
Sign up to set email alerts
|

A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks

Abstract: Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics. Obviously, it is important to implement a low-cost and efficient mechanism of anti-invasion, anti-eavesdropping and anti-attack in MANETs, especially for military scenarios. The purpose of intruding or attacking a MANET is usually different from that of wired Internet networks whose security mechanism has been widely… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…As examples, it has been proposed to randomly simulate network node downtimes to improve network stability 27 ; while changing a network's configuration randomly, by dynamically altering associated IP addresses, enhances its security. 28 Before investigating the performance of intentionally introducing random sampling plans for control charting, it is important to first understand the sampling plans that are commonly employed in practice to establish a performance baseline. This work considers processes that manufactures products at a constant rate, where 𝑀𝑃 𝑖 is the 𝑖 𝑡ℎ Manufactured Product.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As examples, it has been proposed to randomly simulate network node downtimes to improve network stability 27 ; while changing a network's configuration randomly, by dynamically altering associated IP addresses, enhances its security. 28 Before investigating the performance of intentionally introducing random sampling plans for control charting, it is important to first understand the sampling plans that are commonly employed in practice to establish a performance baseline. This work considers processes that manufactures products at a constant rate, where 𝑀𝑃 𝑖 is the 𝑖 𝑡ℎ Manufactured Product.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, the approach of deliberately introducing randomness has been frequently applied in the field of Information Technology (IT) to ensure process stability and security. As examples, it has been proposed to randomly simulate network node downtimes to improve network stability 27 ; while changing a network's configuration randomly, by dynamically altering associated IP addresses, enhances its security 28 …”
Section: Methodsmentioning
confidence: 99%
“…In [19], the authors proposed a technique called Random Host Mutation (RHM), where hosts are assigned virtual IP addresses that are changed randomly and synchronously over time. Similar approaches were proposed for different areas such as cloud computing platforms [26], IoT [27], Mobile Ad Hoc Networks (MANETs) [28], and network-level applications. Port numbers are logical addresses that are used to deliver packets to the corresponding protocol.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The working principle is to collect and analyze data information in the network 5 Wireless Communications and Mobile Computing to extract offensive details and behaviors to determine whether the data has intrusions. Unauthorized or abnormal access behavior in the network is judged [27].…”
Section: Idsmentioning
confidence: 99%