Downloads: 123 | Views: 257
Survey Paper | Computer Science & Engineering | Tanzania | Volume 4 Issue 9, September 2015 | Popularity: 6.7 / 10
A Study of Security Challenges and Solutions in Mobile Ad-Hoc Network
Thangaraj E, Dinesh Ruban J
Abstract: Mobile Ad Hoc Network (MANET) is a more number of communication devices or nodes that to communicate without any fixed infrastructure and pre-determined organization of current links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Even though the new trend is to adopt ad hoc networks for commercial uses due to their unique properties, the import challenge is the vulnerability to security attacks. A more number of challenges like open peer-to-peer network architecture, shared wireless medium, dynamic network topology etc. As MANET is quickly spreading for the property of its capability in making temporary network without the aid of any established infrastructure or distributed administration, security challenges has become a important concern to provide secure communication. In this paper we find the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. In our study, we have found that necessity of secure routing protocol is still have question. There is no general algorithm that suitable for well against the most commonly known attacks such as wormhole, rushing attack etc. In finally, we focus on the findings and future works which may be for the researchers like robust key management, trust based systems, data security in different layer. However, in short, we can say that the complete security solution requires the prevention, detection.
Keywords: Hybrid routing protocols, Distance Vector Routing, Dynamic Source Routing, Ad Hoc On Demand Distance Vector, Message authentication code
Edition: Volume 4 Issue 9, September 2015
Pages: 391 - 396
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2223 - 2228Survey on Wireless Sensor Network for Message Authentication and Source Privacy
Vaishali Kisanrao Gulhane, S. N. Shelke
Downloads: 110
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1154 - 1158Route Optimization using Membrane Computing in Opportunistic Network
Ritu, Manjot Kaur Sidhu
Downloads: 117
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1449 - 1453Review on Message Authentication Protocol for Vehicular Ad Hoc Network
Sarika A. Velukar, Dr. M. S. Ali
Downloads: 120
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 781 - 784Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking
Snehal M. Shewale, Prof. Y. B. Gurav
Downloads: 120
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1676 - 1679Performance Analysis of Routing Algorithms: AODV, DSDV, OLSR, DSR in WPAN
P. Padmanabham, Y. Ramesh