51,541 research outputs found

    A Study on Enhancement of the Security of the Routing Protocols in Adhoc Networks

    Get PDF
    An ad hoc wireless network is a set of wireless mobile nodes that self-configure to build a network without the requirement for any reputable infrastructure or backbone. Mobile nodes are utilized by the Ad hoc networks to facilitate effective communication beyond the wireless transmission range. As ad hoc networks do not impose any fixed infrastructure, it becomes very tough to handle network services with the available routing approaches, and this creates a number of problems in ensuring the security of the communication. Majority of the existing ad hoc protocols that deal with security issues depends on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity,availability and nonrepudiation should not be compromised in any circumstances. Thus, security in ad hoc networks becomes an active area of research in the field of networking. There are various techniques available in the literature for providing security to the ad hoc networks. This paper focuses on analyzing the various routing protocols available in the literature for ad hoc network environment and its applications in security mechanisms

    A Survey in Wireless Ad hoc Network Security and Secure Energy Optimization Approaches for Routing

    Get PDF
    Wireless ad hoc network nodes together establish a network infrastructure without using any access points or base stations for communicates using multi hop schemes. It has significant characteristics like dynamic topologies, constrained in bandwidth and limited resource a high challenge in implementing security with optimized energy resource utilization which is the key aspects while designing modern ad hoc networks architecture. Ad hoc Networks nodes are limited in broadcast range, and also their capabilities of computation and storage are well limited to their energy resources. This limitation of resources in wireless ad hoc creates high challenges in incorporating security mechanism for routing security and privacy maintenance. This paper investigates the various issues and challenges in secure routing and energy optimization during communication in wireless ad hoc network towards security and secure energy utilization improvisation

    Security in Ad hoc Network through Intrusion Detection Techniques

    Get PDF
    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Not like traditional mobile wireless networks, ad hoc networks do not depend on any fixed infrastructure. Rather, hosts depend on one another to keep the network associated. Security is the main concern in ad-hoc networks. Owe to the vulnerable nature of the mobile ad hoc network, there are various security threats that upset its improvement. There examine the fundamental vulnerabilities in the mobile ad hoc networks, which have made it a lot simpler to experience the effects of attacks than the conventional wired system. At that point examine the security criteria of the mobile ad hoc network and present the primary attack types that exist in it. At long last study the present security solutions through Intrusion Detection Technique for the mobile ad hoc network. There are two technique cluster based Intrusion Detection Technique for the mobile ad hoc network and misbehaviour Detection through Cross-layer Analysis are described

    LD: Identifying Misbehaving Nodes in MANET

    Get PDF
    A mobile ad-hoc network is a collection of mobile nodes connected together over a wireless medium without any fixed infrastructure. Unique characteristics of mobile ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium and highly dynamic topology, pose various challenges to the security design. Mobile ad-hoc networks lack central administration or control, making them very vulnerable to attacks or disruption by faulty nodes in the absence of any security mechanisms. Also, the wireless channel in a mobile ad-hoc network is accessible to both legitimate network users and malicious attackers. So, the task of finding good solutions for these challenges plays a critical role in achieving the eventual success of mobile ad-hoc networks. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. Secure routing protocols and mechanisms to detect routing misbehavior in the direct neighborhood exist; however, collusion of misbehaving nodes has not been adequately addressed yet. We present LeakDetector, a mechanism to detect colluding malicious nodes in wireless multihop networks A mobile ad-hoc network is a collection of mobile nodes connected together over a wireless medium without any fixed infrastructure. Unique characteristics of mobile ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium and highly dynamic topology, pose various challenges to the security design. Mobile ad-hoc networks lack central administration or control, making them very vulnerable to attacks or disruption by faulty nodes in the absence of any security mechanisms. Also, the wireless channel in a mobile ad-hoc network is accessible to both legitimate network users and malicious attackers. So, the task of finding good solutions for these challenges plays a critical role in achieving the eventual success of mobile ad-hoc networks. However,the. LeakDetector enables the calculation of the packet-loss ratio for the individual nodes

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Non-repudiation in pure mobile ad hoc network

    Get PDF
    Within the last decade, the use of wireless technologies has become more prevalent. Wireless networks have flexible architectures with data transferred via radio waves and can be divided into two categories; infrastructure-based wireless networks and mobile ad hoc network. The mobile ad hoc network (MANET) is an autonomous system which can be dynamically built without pre-existing infrastructure or a trusted third party (TTP). Due to these infrastructure-less and self-organized characteristics, MANET encounters different problems from infrastructure-based wired network, such as key management, power shortage, and security issues. This paper will further divide MANETs into pure ad hoc networks which do not contain a TTP and organized ad hoc networks which contain an offline TTP, and then focus on the security issues especially the non-repudiation issue between two mobile nodes which communicate in pure ad hoc networks

    The Effect of Eavesdropping and Wormhole Attacks on Mobile Ad Hoc Network

    Get PDF
    Security has become the main concern to grant protected communication between mobile nodes in an unfriendly environment. Wireless Ad Hoc network might be unprotected against attacks by malicious nodes. This project evaluates the impact of some adversary attacks on mobile Ad Hoc network system (MANET's) which have be tested using QualNet simulator. Moreover, it investigates the active and passive attack on mobile Ad Hoc network. At the same time, it measures the performance of MANET with and without these attacks. The simulation is done on data link layer and network layer of mobile nodes in wireless Ad Hoc network. The results of this evaluation are very important to estimate the deployment of the Mobile Ad Hoc nodes for security. Moreover, this study have been analyzed the performance of MANET and perform 'what-if' analyses to optimize them

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
    • …
    corecore