A Survey on Security in Mobile Ad-Hoc Network and Solutions
Navneet Kumar1
Section:Survey Paper, Product Type: Journal Paper
Volume-3 ,
Issue-7 , Page no. 32-36, Jul-2015
Online published on Jul 30, 2015
Copyright © Navneet Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Navneet Kumar, “A Survey on Security in Mobile Ad-Hoc Network and Solutions,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.32-36, 2015.
MLA Style Citation: Navneet Kumar "A Survey on Security in Mobile Ad-Hoc Network and Solutions." International Journal of Computer Sciences and Engineering 3.7 (2015): 32-36.
APA Style Citation: Navneet Kumar, (2015). A Survey on Security in Mobile Ad-Hoc Network and Solutions. International Journal of Computer Sciences and Engineering, 3(7), 32-36.
BibTex Style Citation:
@article{Kumar_2015,
author = {Navneet Kumar},
title = {A Survey on Security in Mobile Ad-Hoc Network and Solutions},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {32-36},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=570},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=570
TI - A Survey on Security in Mobile Ad-Hoc Network and Solutions
T2 - International Journal of Computer Sciences and Engineering
AU - Navneet Kumar
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 32-36
IS - 7
VL - 3
SN - 2347-2693
ER -
VIEWS | XML | |
2646 | 2534 downloads | 2442 downloads |
Abstract
Ad hoc networks are temporary networks connection established for a small session, self-configured and organized networks without any fixed infrastructure. In Ad hoc networks, topology is dynamic as nodes communicate the network “on the fly” for a special purpose (such as transferring data between one computer to another). A Mobile Ad hoc network (MANET) is a dynamically arrangement of wireless Mobile nodes, communicate directly or using intermediate nodes without any predefined infrastructures. In the absence of any predefined infrastructures in networks become vulnerable to number of attacks and high level security becomes a major issue. In this survey paper, we first discuss the introduction to Mobile Ad hoc network. The second section discusses weaknesses or vulnerabilities in Mobile Ad hoc network. The third section discusses the types of attack in Mobile Ad hoc network. The fourth section discusses the security goals of Mobile Ad hoc network. Finally the last section discusses the security solutions to prevent the attacks and provide a high level security to Mobile Ad hoc networks.
Key-Words / Index Term
Mobile Ad Hoc Networks, Attacks, Security, Solutions
References
[1]. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.
[2]. M. Weiser, The Computer for the Twenty-First Century, Scientific American, September1991.
[3]. [3] M.S. Corson, J.P. Maker, and J.H. Cernicione, Internet-based Mobile Ad Hoc Networking, IEEE Internet Computing, pages 63–70, July-August 1999.
[4]. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
[5]. Lidong Zhou and Zygmunt J. Hass, Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security, November/December 1999.
[6]. Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005.
[7]. Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
[8]. Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147.
[9]. Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
[10]. P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks and Distributed Systems