134,757 research outputs found

    A Study on Enhancement of the Security of the Routing Protocols in Adhoc Networks

    Get PDF
    An ad hoc wireless network is a set of wireless mobile nodes that self-configure to build a network without the requirement for any reputable infrastructure or backbone. Mobile nodes are utilized by the Ad hoc networks to facilitate effective communication beyond the wireless transmission range. As ad hoc networks do not impose any fixed infrastructure, it becomes very tough to handle network services with the available routing approaches, and this creates a number of problems in ensuring the security of the communication. Majority of the existing ad hoc protocols that deal with security issues depends on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity,availability and nonrepudiation should not be compromised in any circumstances. Thus, security in ad hoc networks becomes an active area of research in the field of networking. There are various techniques available in the literature for providing security to the ad hoc networks. This paper focuses on analyzing the various routing protocols available in the literature for ad hoc network environment and its applications in security mechanisms

    A Survey on Issues and Challenges in Congestion Adaptive Routing in Mobile Ad hoc Network

    Get PDF
    Mobile ad hoc networks is the future wireless communication systems have recently emerged as an important trend. Mobile adhoc network is self-configurable and adaptive. Due to the mobility of nodes, the network congestion occurs and it is difficult to predict load on the network which leads to congestion. Mobile adhoc network suffers from a severe congestion controlling problem due to the nature of shared communication and mobility. Standard TCP controlling mechanism for congestion is not fit to the dynamic changing topology of MANETs. This provides a wide scope of research work in mobile ad hoc network. The purpose of this survey is to study and analyze various issues and challenges in congestion control mechanisms in adaptive routing protocols in Mobile Adhoc Network (MANET)

    A Survey on Security Analysis of Routing Protocols

    Get PDF
    Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network

    Routing Protocols to Enhance Security in MANETS

    Get PDF
    Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network

    Security Issues in Manet and Counter-Measures

    Get PDF
    Mobile Ad-hoc Networks (MANET) are self-configuring networks of mobile nodes connected by wireless links. These nodes are able to move randomly and organize themselves and thus, the network's wireless architecture change rapidly and unpredictably. MANETs are usually utilized in situations of emergency for temporary operations or when there are no resources to set up elaborate networks. Mobile Ad-hoc Networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication network, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks due to the nature of the mobile devices (e.g. low power consumption, low processing load). Most of the ad-hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Apart from security objectives like authentication, availability, confidentiality, and integrity, the ad-hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to survey security issues faced by the mobile ad-hoc network environment and provide a classification of the various security mechanisms. We also analyzed the respective strengths and vulnerabilities of the existing routing protocols and proposed a broad and comprehensive frame-work that can provide a tangible solution

    Group Key Rekeying Technique with Secure Data Encryption in MANETs

    Get PDF
    A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and operate without strict network administration. Ensuring security in mobile ad hoc network is a challenging issue and most of the applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad-hoc network, each node treated as a terminal and also acts as an intermediate router. In this scenario, multi-hop occurs for communication in mobile ad hoc network. There may be a possibility of threats and malicious nodes in between source and destination. Providing the security in MANET is entirely different from the traditional wired network. In the present scenario, various applications of the mobile ad hoc network have been proposed and issues are solved by using the cryptographic techniques. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The purpose of key management is to provide secure procedures for handling keys in the cryptographic technique. The responsibilities of key management include key generation, key distribution, and key maintenance. Several key management schemes have been introduced for MANETs. The Group key management scheme is an efficient method for key management in MANET. In group key management scheme, rekeying is used whenever a new node joins or existing node leaves from the group. In this paper, we propose a periodic rekeying method (PRK) and analyze the performance of LKH rekeying techniques in a group key management schemes. The symmetric encryption techniques are analyzed with different parameters, such as Throughput and Energy consumption. Security and performance of rekeying protocols are analyzed through detailed study and simulation

    Context Aware Service Oriented Computing in Mobile Ad Hoc Networks

    Get PDF
    These days we witness a major shift towards small, mobile devices, capable of wireless communication. Their communication capabilities enable them to form mobile ad hoc networks and share resources and capabilities. Service Oriented Computing (SOC) is a new emerging paradigm for distributed computing that has evolved from object-oriented and component-oriented computing to enable applications distributed within and across organizational boundaries. Services are autonomous computational elements that can be described, published, discovered, and orchestrated for the purpose of developing applications. The application of the SOC model to mobile devices provides a loosely coupled model for distributed processing in a resource-poor and highly dynamic environment. Cooperation in a mobile ad hoc environment depends on the fundamental capability of hosts to communicate with each other. Peer-to-peer interactions among hosts within communication range allow such interactions but limit the scope of interactions to a local region. Routing algorithms for mobile ad hoc networks extend the scope of interactions to cover all hosts transitively connected over multi-hop routes. Additional contextual information, e.g., knowledge about the movement of hosts in physical space, can help extend the boundaries of interactions beyond the limits of an island of connectivity. To help separate concerns specific to different layers, a coordination model between the routing layer and the SOC layer provides abstractions that mask the details characteristic to the network layer from the distributed computing semantics above. This thesis explores some of the opportunities and challenges raised by applying the SOC paradigm to mobile computing in ad hoc networks. It investigates the implications of disconnections on service advertising and discovery mechanisms. It addresses issues related to code migration in addition to physical host movement. It also investigates some of the security concerns in ad hoc networking service provision. It presents a novel routing algorithm for mobile ad hoc networks and a novel coordination model that addresses space and time explicitly

    Issues in location-based multicast routing in manets

    Get PDF
    Mobile Ad Hoc Networks (MANETs) are an autonomous system of a set of mobile nodes connected by shared wireless links, forming a temporary network without relying on any infrastructure. MANETs characteristics include self-organizing, self-configuring, multihop communication, continuous mobility and strict resource limitation. These characteristics coupled with the characteristics of the wireless communication medium make routing protocols one of the major issues to consider in MANET

    Ad Hoc Networking in the Internet: A Deeper Problem Than It Seems

    Get PDF
    Self-organized networks, also known as ad hoc networks or MANETs, are expected to soon become important components in the Internet architecture. Numerous efforts currently focus on the accomplishment of scalable and efficient mobile ad hoc routing, an essential piece in order to fully integrate ad hoc networks in the Internet. However, an orthogonal and yet as important issue lies with ad hoc IP autoconfiguration. Indeed, prior to participation in IP communication and routing, a node must acquire IP addresse(s) to configure its interface(s). These IP addresses may be required to be unique within a certain scope and/or topologically "correct". Since nodes may be mobile and neither the set of nodes in the MANET nor their connections to each other is pre-determined, the proper configuration must be detected and acquired automatically. This paper reviews the applicability, in the particular context of MANETs, of standard automatic address configuration and prefix allocation protocols, and identifies the different categories of issues that are not solved by these protocols. The paper then elaborates further on why these issues are more profound than they seem, as they pertain to graph theory and are in fact real scalability and architectural issues for the Internet of tomorrow

    Overview on Network Security and its Vulnerabilities

    Get PDF
    In this paper, we talk about security issues and their current results in the versatile specially appointed system. Mobile ad hoc network can be defined as a collection of mobile nodes which can be useful for form a network without help existing network. Nodes in network act as host and router which is used for send the packets for other device. The nature of MANET are dynamic topology, node mobility, scalability, self organizing capability is lead the network. Many security threats that disturb the open and distributed communication development which is challenging task .We first break down the primary vulnerabilities in the portable mobile ad hoc networks, which have made it much simpler to experience the ill effects of assaults than the conventional wired system. At that point we talk about the security criteria of the portable mobile ad hoc network what more present the principle assault sorts that exist in it. At last we overview the current security answers for the portable specially appointed system
    corecore