Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite old but still practical implementation is difficult due to security and other problems. Since the ad hoc environment is very vulnerable to a multitude of different attacks, new methods of securing these network environments have to be developed. Mobile ad hoc networks or MANETs are supposed to play an important role in future military communication, natural disaster, isolated areas and many more. But while offering many advantages, the MANET technologies today are facing new security threats. Only one malicious node can be sufficient to distort operation in a MANET not using any security mechanism. Number of different algorithms and solution are available, but, realization of robust security architecture is impossible without proper understanding of possible threats and their consequences.
Authors and Affiliations
Ashish Patel , Rutvij Jhaveri
Review on Authorization control for a semantic data repository and database management system
Due to the increasing amount of data available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. The Semantic Web is well recognized as an ef...
Implementation of Skyline Sweeping Algorithm
Searching keywords in databases is complex task than search in files. Information Retrieval (IR) process search keywords from text files and it is very important that queering keyword to the relational databases. General...
Enhanced Energy Conserving Improved and Balanced LEACH for Heterogeneous Wireless Sensor Networks
Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Main goal is to conserve the transmitted energy from various...
Performance Analysis of DCT Based Digital Image Watermarking Using Color Spaces Effects
Digital watermarking is the field of digital image processing which deals with hiding information in a digital content. In this paper, performance analysis of DCT (Discrete Cosine Transform) based digital image watermark...
Paramount role of sequencing in Ubiquitous forms of Nucleotide
Protein microarrays allow biologist to measure the characteristics of amino acid sequence on a small chip. It generates voluminous of data and new intelligent methods are needed to analyze them. Sequence alignment is cha...