Research Article | Open Access | Download PDF
Volume 4 | Issue 6 | Year 2013 | Article Id. IJCTT-V4I6P120 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I6P120
MANET: Security Aspects and Challenges
Md Tanzilur Rahman, Kunal Gupta
Citation :
Md Tanzilur Rahman, Kunal Gupta, "MANET: Security Aspects and Challenges," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 6, pp. 1621-1625, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I6P120
Abstract
There have been a huge advancement in the field of wireless networks in last few decades. It gives new direction in the field of internet with its large number of applications. A mobile ad hoc network or MANET is self-configuring infrastructure less network of mobile device (laptops, smartphones, sensors, etc.) connects by wireless link. This type of network is standalone network. Security is a primary issue in order to provide secure communication in hostile environment. There are still some challenges associated with MANETS that needs to be overcome. These challenges includes routing, short battery life, limited capacity, dynamically change topology etc. In this paper we present the fundamental challenging issues, Security challenges and different types of Attacks associated with MANETs.
Keywords
MANETs, Ad Hoc Networks, Routing protocols.
References
[1] Hoang Lan Nguyen, Uyen Trang Nguyen. “A study of different types of attacks on multicast in mobile ad hoc networks”. Ad Hoc Networks, Volume 6, Issue 1, Pages 32-46, January 2008./
[2] Humayun Bakht “History of Mobile Ad hoc Networks” http://www.oocities.org/humayunbakht/HMANET.pdf
[3] Nishu Garg, R.P.Mahapatra. “MANET Security Issues”. IJCSNS International Journal of Computer Science and Network Security, Volume.9, No.8, 2009.
[4] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “An Overview of Mobile ad hoc Netwroks: Applications & Challenges .“
[5] Bin Xie and Anup Kumar. “A Framework for Internet and Ad hoc Network Security”. IEEE Symposium on Computers and Communications (ISCC-2004), June 2004.
[6] Ram Ramanathan and Jason Redi “A Brief Overview Of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002
[7] Y.Hu, A Perrig and D. Johnson, Ariadne: A secure On-demand Routing Protocol for Ad Hoc Networks, in Proceeding of ACM MOBICOM'02, 2002.
[8] HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,‖, Pg. 38-47, Vol 11, issue 1, Feb 2004.
[9] Andrea Goldsmith “Wireless Communications” Cambridge University Press.
[10] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade ”Mobile Ad Hoc Networking: Imperatives and Challenges”
[11] A Mishra and K.M Nadkarni, security in wireless Ad -hoc network, in Book. The Hand book of Ad Hoc Wireless Networks (chapter 30), CRC press LLC, 2003.
[12] M. Frodigh, P. Johansson, and P. Larsson.―Wireless ad hoc networking: the art of networking without a network,‖ Ericsson Review,No.4, 2000, pp. 248-263.