Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite old but still practical implementation is difficult due to security and other problems. Since the ad hoc environment is very vulnerable to a multitude of different attacks, new methods of securing these network environments have to be developed. Mobile ad hoc networks or MANETs are supposed to play an important role in future military communication, natural disaster, isolated areas and many more. But while offering many advantages, the MANET technologies today are facing new security threats. Only one malicious node can be sufficient to distort operation in a MANET not using any security mechanism. Number of different algorithms and solution are available, but, realization of robust security architecture is impossible without proper understanding of possible threats and their consequences.
Authors and Affiliations
Ashish Patel , Rutvij Jhaveri
Recent Developments in Superresolution
Super resolution imaging refers to inferring the missing high resolution image from low resolution image(s). Super resolution methods are generally classified into reconstruction based and learning based methods. This pa...
A Review on Different Transform based Watermarking Techniques
Over the past decades, watermarking plays a vital role in the branch of information hiding and it hides information in digital media. Watermarking is also used to prevent illegal usage as well as copyright protection or...
TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
Implementation of Knowledge Mining with Ontology
Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...
A Comparative Study of Various Network Simulation Tools
In the area of network research, establishing a network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. Thus a network simulator tool helps the network developer to che...