A Survey on Contemporary MANET Security: Approaches for Securing the MANET

نویسندگان

  • Rajan Patel
  • Pariza Kamboj
چکیده

The wireless mobile nodes are capable to build spontaneously temporary wireless network in absence of infrastructure like AP, Router etc. and they act as a wireless router. Due to this, wireless mobile nodes are capable for forwarding messages to other nodes. MANET (Mobile Adhoc Network) is a one of the wireless network and forms a temporary connection across the mobile nodes without central infrastructure to exchange the information. Due to the characteristics of MANET, it is vulnerable to active and passive attacks from internal and external attacker. This will lead to various security challenges. There is a requirement to secure the MANET from threats and vulnerability. Many security mechanisms are established to secure and protect the MANET. This article is intended to provide contemporary MANET security with perspective of routing protocol security and data security with key management, and monitoring the MANET during routing and/or data transmission using IDS (Intrusion Detection System). This article presents the various attacks face by MANET and its security goals. The article explored various security solutions for routing protocols, data security using cryptography as a first line of defence, key management for securing communication. It also explored various IDS schemes as a second line of defence in MANET. KeywordCryptography, Data security, attack, IDS, Routing protocol, Secret sharing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Distributed Key Management Scheme for Mobile Ad-Hoc Network-A Survey

Ensuring security in Mobile Ad-hoc Network is a challenging issue. Mobile ad-hoc networks (MANET) are networks designed to operate in more volatile and rapidly changing environment. Establishing MANET security is entirely different from the traditional methods of providing network security. The two main approaches that are widely used in securing MANET are proactive and reactive. The first atte...

متن کامل

A Survey on Security in Mobile Peer-to-Peer Architectures - Overlay-Based vs. Underlay-Based Approaches

Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application ...

متن کامل

Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks

Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without any centralized authority. These unique characteristics, coupled with the increased vulnerability of MANET for security attacks, demand an immediate solution for securing the ad hoc network prior to its full-fledged deployment in commercial and military applications. So far, most of the research in ...

متن کامل

Intruder Identification and Response Framework for Mobile Ad hoc Networks

Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without any centralized authority. These unique characteristics coupled with the increased vulnerability of MANET for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in M...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017