Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite old but still practical implementation is difficult due to security and other problems. Since the ad hoc environment is very vulnerable to a multitude of different attacks, new methods of securing these network environments have to be developed. Mobile ad hoc networks or MANETs are supposed to play an important role in future military communication, natural disaster, isolated areas and many more. But while offering many advantages, the MANET technologies today are facing new security threats. Only one malicious node can be sufficient to distort operation in a MANET not using any security mechanism. Number of different algorithms and solution are available, but, realization of robust security architecture is impossible without proper understanding of possible threats and their consequences.
Authors and Affiliations
Ashish Patel , Rutvij Jhaveri
A Novel Authentication Protocol Based on Elliptic Curves
Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client w...
Wavelet Based Normal and Abnormal Heart Sound Identification using Spectrogram Analysis
The present work proposes a computer-aided normal and abnormal heart sound identification based on Discrete Wavelet Transform (DWT), it being useful for tele-diagnosis of heart diseases. Due to the presence of Cumulative...
System for Devices mobile based in recognition facial
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...
Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
Increase treatment quality is the most challenging task because clinical status of the patient and circumstances inside a healthcare organization constantly change. In this paper we present a Rule based Exception handlin...
A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment
Software aging is a phenomenon that occurs in a long running complex software system that tends to decrease in performance or increase in failure rate. This phenomenon lead to performance degradation and crash/hang failu...