An Optimized Survey on Security Issues in Mobile Adhoc Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 1
Abstract
Security has become a prime concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer to peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. The security solutions are therefore required to achieve both broad protection and desirable network performance. In this paper we focus on the fundamental security problem of protecting the data transmitting between two nodes in a MANET. We also identify the security issues in MANET and ongoing research in securing MANETs.
Authors and Affiliations
Suruchi Sharma, Sangeeta Monga
Online Fee Payment System
This is a web-based application. In this paper we will be maintaining the complete details of the college through online i.e. maintaining the student data, administration data, hostel data and also the generating the re...
A Multiband MIMO Microstrip Patch Antenna for Wireless Applications
This letter presents the design of a compact size modified rectangular shaped microstrip line feed with DGS patch antenna is proposed here. DGS structure is used for improving the performance of microstrip patch antenna...
Transport System Using Automatic Toll ETicketing
As we all know that these days the operations of the toll plazas are done manually, in which cash is collected by the operator from the driver and a receipt of it is given to the driver. Basically, this initiative is ch...
Radio Frequency Identification based Destocks Management System using MATLAB
Radio frequency identification (RFID) is a term that issued to describe a system that transfers the identity of an object or person wirelessly, using radio waves. It falls under the category of automatic identification...
Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detai...