International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123 | Views: 184

Survey Paper | Computer Science & Engineering | Tanzania | Volume 4 Issue 9, September 2015


A Study of Security Challenges and Solutions in Mobile Ad-Hoc Network

Thangaraj E [3] | Dinesh Ruban J


Abstract: Mobile Ad Hoc Network (MANET) is a more number of communication devices or nodes that to communicate without any fixed infrastructure and pre-determined organization of current links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Even though the new trend is to adopt ad hoc networks for commercial uses due to their unique properties, the import challenge is the vulnerability to security attacks. A more number of challenges like open peer-to-peer network architecture, shared wireless medium, dynamic network topology etc. As MANET is quickly spreading for the property of its capability in making temporary network without the aid of any established infrastructure or distributed administration, security challenges has become a important concern to provide secure communication. In this paper we find the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. In our study, we have found that necessity of secure routing protocol is still have question. There is no general algorithm that suitable for well against the most commonly known attacks such as wormhole, rushing attack etc. In finally, we focus on the findings and future works which may be for the researchers like robust key management, trust based systems, data security in different layer. However, in short, we can say that the complete security solution requires the prevention, detection.


Keywords: Hybrid routing protocols, Distance Vector Routing, Dynamic Source Routing, Ad Hoc On Demand Distance Vector, Message authentication code


Edition: Volume 4 Issue 9, September 2015,


Pages: 391 - 396


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top