International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123 | Views: 257

Survey Paper | Computer Science & Engineering | Tanzania | Volume 4 Issue 9, September 2015 | Popularity: 6.7 / 10


     

A Study of Security Challenges and Solutions in Mobile Ad-Hoc Network

Thangaraj E, Dinesh Ruban J


Abstract: Mobile Ad Hoc Network (MANET) is a more number of communication devices or nodes that to communicate without any fixed infrastructure and pre-determined organization of current links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Even though the new trend is to adopt ad hoc networks for commercial uses due to their unique properties, the import challenge is the vulnerability to security attacks. A more number of challenges like open peer-to-peer network architecture, shared wireless medium, dynamic network topology etc. As MANET is quickly spreading for the property of its capability in making temporary network without the aid of any established infrastructure or distributed administration, security challenges has become a important concern to provide secure communication. In this paper we find the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. In our study, we have found that necessity of secure routing protocol is still have question. There is no general algorithm that suitable for well against the most commonly known attacks such as wormhole, rushing attack etc. In finally, we focus on the findings and future works which may be for the researchers like robust key management, trust based systems, data security in different layer. However, in short, we can say that the complete security solution requires the prevention, detection.


Keywords: Hybrid routing protocols, Distance Vector Routing, Dynamic Source Routing, Ad Hoc On Demand Distance Vector, Message authentication code


Edition: Volume 4 Issue 9, September 2015


Pages: 391 - 396



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Thangaraj E, Dinesh Ruban J, "A Study of Security Challenges and Solutions in Mobile Ad-Hoc Network", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 391-396, https://www.ijsr.net/getabstract.php?paperid=SUB157945

Similar Articles

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1154 - 1158

Route Optimization using Membrane Computing in Opportunistic Network

Ritu, Manjot Kaur Sidhu

Share this Article

Downloads: 117

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1449 - 1453

Review on Message Authentication Protocol for Vehicular Ad Hoc Network

Sarika A. Velukar, Dr. M. S. Ali

Share this Article

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 781 - 784

Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking

Snehal M. Shewale, Prof. Y. B. Gurav

Share this Article

Downloads: 120

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1676 - 1679

Performance Analysis of Routing Algorithms: AODV, DSDV, OLSR, DSR in WPAN

P. Padmanabham, Y. Ramesh

Share this Article
Top