A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
Abstract— An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and non- repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze threats faced by the ad hoc network environment and provide a classification of the various security mechanisms.
Authors and Affiliations
C. Sreedhar , Dr. S. Madhusudhana Verma , Prof. N. Kasiviswanath
Cryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight c...
Control Flow Prediction through Multiblock Formation in Parallel Register Sharing Architecture
In this paper we introduce control flow prediction (CFP) in arallel register sharing architecture. The main idea behind this concept is to use a step beyond the prediction of common branch and permitting the hardware to...
Image Mining using Content Based Image Retrieval System
The image depends on the Human perception and is also based on the Machine Vision System. The Image Retrieval is based on the color Histogram, texture. The perception of the Human System of Image is based on the Human Ne...
MLIP: A Concurrent Approach for Clipping Indexing
Multidimensional databases are beginning to be used in a wide range of applications. To meet this fast-growing demand, the R-tree family is being applied to support fast access to multidimensional data, for which the R+-...
Trust Based Load Distribution in a Data Grid Environment
The basic idea of a load balancing system is to transfer partial of system workload from busy nodes to some idle nodes. The target resource selection for task migration is a key factor in the load balance strategy. As gr...