Security Issues Pertaining to Ad-Hoc Networks - A Survey
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 1
Abstract
A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links—the union of which form an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. MANETs are usually set up in situations of emergency for temporary operations or simply if there are no resources to set up elaborate networks. These types of networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, mainly due to the nature of the mobile devices (e.g. low power consumption, low processing load). Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Besides the general security objectives like authentication, confidentiality, integrity, availability and non-repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze threats faced by the ad hoc network environment and provide a classification of the various security mechanisms. We analyzed the respective strengths and vulnerabilities of the existing routing protocols and suggest a broad and comprehensive framework that can provide a tangible solution.
Authors and Affiliations
Rishu Bhatia , Deepak Gupta , Shankar Kumar Vijay
A Cluster Based Keyword Filtration Approach for Web Document Summarization
Summarization, an extremely important technique in Data Mining is an automatic learning technique aimed to extract the most valuable information from a large size document or the articles. The goal is to create the summa...
MATERIAL HANDLING IN FLEXIBLE MANUFACTURING SYSTEM
The objective of this study is to analyze the system performance of a flexible manufacturing system cell. The study gives information on production potential of the cell by grouping common parts. To complete this, comput...
GRID COMPUTING AND CHECKPOINT APPROACH
Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a distributed computing paradigm that differs from traditiona...
Web Crawler: A Review
In a large distributed system like the Web, users find resources by following hypertext links from one document to another. When the system is small and its resources share the same fundamental purpose, users can find r...
Avoiding Redundant Redirect Datagram during Handoff Completing in a Campus Size Wireless Mobile Network
Wireless mobile communication is one of the most challenging research areas for communication. In the past few years, considerable effort has been spent in research on networking protocols and applications. A node wanti...