MANET Security Issues

نویسنده

  • Nishu Garg
چکیده

When a routing protocol for manet Networks (mobile and ad hoc networks) does a route discovery, it does not discover the shortest route but the route through which the route request flood traveled faster. In addition, since nodes are moving, a route that was the shortest one at discovery time might stop being so in quite a short period of time. This causes, not only a much bigger end-to-end delay, but also more collisions and faster power consumption. In order to avoid all the performance loss due to these problems, this paper develops a technique to periodically discover shortcuts to the active routes that can be used with any destination vector routing protocol. It also shows how the same mechanism can be used as a bidirectional route recovery mechanism.[1] We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV in detail and develop a security mechanism to protect its routing information. We also briefly discuss whether our techniques would also be applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution that we provide. [2]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communica...

متن کامل

Routing Protocols and Security Issues in MANET: A Survey

A Mobile Ad-hoc Network (MANET) is a collection of mobile devices which are dynamic in nature and they communicate with each other without any help of a preinstalled infrastructure, access point or centralized administration. One of the major challenges in a MANET, is to design the robust routing algorithms. Routing is an essential and major concern for effective and reliable communication betw...

متن کامل

Security Issues in Manet: A Survey on Attacks and Defense Mechanisms

Mobile Adhoc NETwork (MANET) is a collection of mobile nodes which can communicate directly with other nodes within its transmission range and use multihop routing for nodes outside its transmission range. The inherent features of MANETs like dynamic topology, limited network resources (bandwidth, memory and battery power) and lack of centralized trusted authority makes it more vulnerable to at...

متن کامل

Efficient and Secure Protocol for Mobile Ad-hoc Networks

Mobile ad hoc networks (MANET) are currently the most evolving research area in wireless networks as well as mobile communications. Discovering a new path upon route failure has become hot research issue. Also current MANET protocols are being designed without security in mind, where it is assumed that all the nodes in the network are friendly. In MANET communications, every node in the network...

متن کامل

Classification and Review of Security Schemes in Mobile Computing

In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-incre...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009