Open Access   Article Go Back

A Survey on Security in Mobile Ad-Hoc Network and Solutions

Navneet Kumar1

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 32-36, Jul-2015

Online published on Jul 30, 2015

Copyright © Navneet Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Navneet Kumar, “A Survey on Security in Mobile Ad-Hoc Network and Solutions,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.32-36, 2015.

MLA Style Citation: Navneet Kumar "A Survey on Security in Mobile Ad-Hoc Network and Solutions." International Journal of Computer Sciences and Engineering 3.7 (2015): 32-36.

APA Style Citation: Navneet Kumar, (2015). A Survey on Security in Mobile Ad-Hoc Network and Solutions. International Journal of Computer Sciences and Engineering, 3(7), 32-36.

BibTex Style Citation:
@article{Kumar_2015,
author = {Navneet Kumar},
title = {A Survey on Security in Mobile Ad-Hoc Network and Solutions},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {32-36},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=570},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=570
TI - A Survey on Security in Mobile Ad-Hoc Network and Solutions
T2 - International Journal of Computer Sciences and Engineering
AU - Navneet Kumar
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 32-36
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2646 2534 downloads 2442 downloads
  
  
           

Abstract

Ad hoc networks are temporary networks connection established for a small session, self-configured and organized networks without any fixed infrastructure. In Ad hoc networks, topology is dynamic as nodes communicate the network “on the fly” for a special purpose (such as transferring data between one computer to another). A Mobile Ad hoc network (MANET) is a dynamically arrangement of wireless Mobile nodes, communicate directly or using intermediate nodes without any predefined infrastructures. In the absence of any predefined infrastructures in networks become vulnerable to number of attacks and high level security becomes a major issue. In this survey paper, we first discuss the introduction to Mobile Ad hoc network. The second section discusses weaknesses or vulnerabilities in Mobile Ad hoc network. The third section discusses the types of attack in Mobile Ad hoc network. The fourth section discusses the security goals of Mobile Ad hoc network. Finally the last section discusses the security solutions to prevent the attacks and provide a high level security to Mobile Ad hoc networks.

Key-Words / Index Term

Mobile Ad Hoc Networks, Attacks, Security, Solutions

References

[1]. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.
[2]. M. Weiser, The Computer for the Twenty-First Century, Scientific American, September1991.
[3]. [3] M.S. Corson, J.P. Maker, and J.H. Cernicione, Internet-based Mobile Ad Hoc Networking, IEEE Internet Computing, pages 63–70, July-August 1999.
[4]. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
[5]. Lidong Zhou and Zygmunt J. Hass, Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security, November/December 1999.
[6]. Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005.
[7]. Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
[8]. Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147.
[9]. Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
[10]. P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks and Distributed Systems