A Survey of Network Security in Mobile Ad-Hoc Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: This paper describes the concept of ad hoc networking and the security issues faced by giving its background and presenting some of the security challenges that are faced by the mobile ad hoc network. Ad hoc wireless communication between devices is defined as a scheme, often referred to as ad hoc networking, which allows devices to establish communication,anytime and anywhere without the aid of a central infrastructure.Before the incorporation of technologies of bluetooth and wifi ,ad hoc networks was oftenassociated with communication on combat fields due to which security in the system has become a major issue. Due to its vulnerable nature, the security threats that disrupts its development .To solve these issues the vulnerabilities in networks are analysed first .Then we discuss the security criteria and main attack typesexisting in ad hoc network .Finally we bring in the current security solutions for the mobile ad hoc network.
Authors and Affiliations
Ashwini Pillai , Anurag Kumar , Mrs. Ajina
A More Secure Position Based Graphical Password Authentication
Abstract: We are proposing a new pass-point graphical password authentication by using a simple virtual environment. Our virtual environment is influenced by a social networking site’ s game. In this system, user interac...
Securing Biomtric Template Over Non-Secure Channel using Cryptography and Helping Data
Abstract: the security of biometric template is a very important aspect in the biometric system. Biometric template are the very important parts of biometric systems and attacker mostly attack on template over nonsecure...
Self Appreciating Concept Based Model For Cross Domain Document Classification
Abstract : In text mining, text categorization is an important technique for classifying the documents. Most of the times statistical approaches that are based on analysis of the term in the form of frequency of th...
Analysis of Digital Image Splicing Detection
Abstract: The availability of photo manipulation software has made it unprecedentedly easy to manipulate images for malicious purposes. One of the most common forms of digital image or photographic manipulation ope...
Teneur: A LINUX based offline content management system
Abstract: This technical section provides a brief synopsis about our offline content management system. The main purpose of this system is to manage the resources such as text files, images in a more synchronized m...