Privacy Anxiety and Challenges in Mobile Ad Hoc Wireless Networks and its Solution
|
Full Text(PDF, 3000) PP.
|
|
Author(s) |
Krishan Kant Lavania, G. L. Saini, Kothari Rooshabh H., Yagnik Harshraj A |
|
KEYWORDS |
Minimum 7 keywords are mandatory, Keywords should closely reflect the topic and should optimally characterize the paper. Use about four key words or phrases in alphabetical order, separated by commas
|
|
ABSTRACT |
Mobile Ad hoc networks are recent wireless networking model for cellular phone hosts. Ad hoc networks do not rely on any stable infrastructure because they are independent. As an alternative, to remain network connected hosts rely on each other. It signifies complex distributed systems that encompass wireless mobile nodes. These nodes can freely and dynamically self-organize into uninformed and provisional, ''ad-hoc'' network topologies. This topology allows citizens to effortlessly interconnect in areas where no pre-existing communication infrastructure. In this paper, we talk about security issues, challenges and their solutions in the mobile ad hoc network. There are numerous security threats that disturb the development of mobile ad hoc network because of the exposed nature of the mobile ad hoc network. We have first studied the prime vulnerabilities in the mobile ad hoc networks, which have made our work much easier to endure from attacks than the usual wired network. The security criteria of the mobile ad hoc network and the main attack types that exist are explained in this paper. As a final point we analyzed the recent security solutions for the mobile ad hoc network
|
|
References |
|
[1] Jun-Zhao Sun “Mobile Ad Hoc Networking: An Essential Technology
for Pervasive Computing”
[2] Hang Zhao “Security for Ad Hoc Networks”.
[3] M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking:
the art of networking without a network,” Ericsson Review,
No.4, 2000, pp. 248-263.
[4] Data Integrity, from Wikipedia, the free encyclopedia,
http://en.wikipedia.org/wiki/Data_integrity.
[5] Wenjia Li and Anupam Joshi “Security Issues in Mobile Ad Hoc
Networks - A Survey”
[6] Anuj Joshi1, Paa llavi Srivastava and Poonam Singh” Security
Threats in Mobile Ad Hoc Network” S-JPSET: ISSN: 2229-7111, Vol. 1,
Issue 2.
[7] Pravin Ghosekar, Girish Katkar Dr. Pradip Ghorpade “Mobile Ad
Hoc Networking: Imperatives and Challenges” IJCA Special Issue on
“Mobile Ad-hoc Networks” MANETs, 2010.
[8] M. Weiser, the Computer for the Twenty-First Century, Scientific
American, September 1991.
[9] Hang Zhao “Security for Ad Hoc Networks”.
[10] H. Deng, W. Li, Agrawal, D.P., ""Routing security in wireless ad
hoc networks,"" Cincinnati Univ., OH, USA; IEEE Communications
Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804.
[11] J. Ahola, Ambient Intelligence, ERCIM (European Research Consortium
for Information and Mathematics) NEWS, N. 47, October 2001.
|
|
|