Security Threats in Manets: A Review

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Threats in MANETS : A Review

Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in a peer-to-peer fashion without involving central access points. Many routing protocols like AODV, DSR etc have been proposed for these networks to find an end to end path between the nodes. These routing protoco...

متن کامل

Cumulative Techniques for Overcoming Security Threats in Manets

In day-to-day communications we may need to establish temporary (ad hoc) connections anytime, anywhere. Data transfer through this ad hoc wireless network is required when it is hard to establish the large infrastructure. In MANETs there are many challenges in terms of deploying security especially when the confidentiality of the data is compromised. If the data is highly confidential, then pro...

متن کامل

A Comprehensive Review of Security Issues in Manets

During the past few years the emergence of Mobile adhoc networks (MANETS) and its various uses in different fields of communication has been observed. It has led to an instant growth in wireless technology. Many routing protocols have been designed and implemented for proper functioning of mobile adhoc networks. The prime objective of these routing protocols is to provide a specific and much ef...

متن کامل

Security threats and solutions in MANETs: A case study using AODV and SAODV

Mobile ad hoc network (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses on networks using the popular Ad-hoc On-demand Distance Vector...

متن کامل

Cognitive Radio Networks Security Threats and Attacks: A Review

Cognitive Radio (CR) is a technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It aims to improve the utilization of the radio spectrum. Although the operational aspects of CR are being explored widely, its security aspects have gained little attention. In this survey, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Information Theory

سال: 2014

ISSN: 2320-8465,2319-7609

DOI: 10.5121/ijit.2014.3204