IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 9    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 9, September 2011
Privacy Anxiety and Challenges in Mobile Ad Hoc Wireless Networks and its Solution
Full Text(PDF, 3000)  PP.  
Author(s)
Krishan Kant Lavania, G. L. Saini, Kothari Rooshabh H., Yagnik Harshraj A
KEYWORDS
Minimum 7 keywords are mandatory, Keywords should closely reflect the topic and should optimally characterize the paper. Use about four key words or phrases in alphabetical order, separated by commas
ABSTRACT
Mobile Ad hoc networks are recent wireless networking model for cellular phone hosts. Ad hoc networks do not rely on any stable infrastructure because they are independent. As an alternative, to remain network connected hosts rely on each other. It signifies complex distributed systems that encompass wireless mobile nodes. These nodes can freely and dynamically self-organize into uninformed and provisional, ''ad-hoc'' network topologies. This topology allows citizens to effortlessly interconnect in areas where no pre-existing communication infrastructure. In this paper, we talk about security issues, challenges and their solutions in the mobile ad hoc network. There are numerous security threats that disturb the development of mobile ad hoc network because of the exposed nature of the mobile ad hoc network. We have first studied the prime vulnerabilities in the mobile ad hoc networks, which have made our work much easier to endure from attacks than the usual wired network. The security criteria of the mobile ad hoc network and the main attack types that exist are explained in this paper. As a final point we analyzed the recent security solutions for the mobile ad hoc network
References
[1] Jun-Zhao Sun “Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing”

[2] Hang Zhao “Security for Ad Hoc Networks”.

[3] M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review, No.4, 2000, pp. 248-263.

[4] Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.

[5] Wenjia Li and Anupam Joshi “Security Issues in Mobile Ad Hoc Networks - A Survey”

[6] Anuj Joshi1, Paa llavi Srivastava and Poonam Singh” Security Threats in Mobile Ad Hoc Network” S-JPSET: ISSN: 2229-7111, Vol. 1, Issue 2.

[7] Pravin Ghosekar, Girish Katkar Dr. Pradip Ghorpade “Mobile Ad Hoc Networking: Imperatives and Challenges” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010.

[8] M. Weiser, the Computer for the Twenty-First Century, Scientific American, September 1991.

[9] Hang Zhao “Security for Ad Hoc Networks”.

[10] H. Deng, W. Li, Agrawal, D.P., ""Routing security in wireless ad hoc networks,"" Cincinnati Univ., OH, USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804.

[11] J. Ahola, Ambient Intelligence, ERCIM (European Research Consortium for Information and Mathematics) NEWS, N. 47, October 2001.

Untitled Page