29,539 Hits in 4.9 sec


2009 Journal of Engineering Science and Technology  
Forwarding packets or participating in routing process, either of each can directly affect the network security state.  ...  Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks.  ...  Different agents have corresponding parts in an immune system to map into. A protocol for securing mobile ad hoc networks based on the proposed architecture will be implemented.  ... 
doaj:9cfa90dcca2040aaa7f85864176cb2fd fatcat:ptlckaar6vbhfpo7g6vyygrdtq

A Novel Security Framework for Protecting Network Layer Operations in MANET

N. Jaisankar, K. Durai Swamy
2009 International Journal of Engineering and Technology  
There have been several papers focused on providing self-organized security support in ad hoc networks.  ...  Abstract-The important security issue in mobile ad hoc networks is to protect the routing layer from malicious attacks.  ... 
doi:10.7763/ijet.2009.v1.86 fatcat:47sheoh7pffgdohwdq3provu7u

Self-organized network-layer security in mobile ad hoc networks

Hao Yang, Xiaoqiao Meng, Songwu Lu
2002 Proceedings of the ACM workshop on Wireless security - WiSE '02  
Protecting the network layer in a mobile ad hoc network is an important research topic in wireless security.  ...  This paper describes our unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding functionalities in the context of the AODV protocol.  ...  There have been some papers on the self-organized security in the ad hoc networks [7, 9] .  ... 
doi:10.1145/570681.570683 dblp:conf/ws/YangML02 fatcat:7lobi2t5bjgfhcnimgrbpwuw2m


Mrs. C. Gayathri
2017 International Journal of Advanced Research in Computer Science  
A Mobile Ad-Hoc Networks is a type of wireless Ad-Hoc network and is self-configuring network of mobile routers linked by wireless links. It is a wireless network without infrastructure.  ...  As an Ad-Hoc network which is deployed in such an environment which is physically insecure Intrusion Detection is one of the major areas of research is Ad-Hoc networks.  ...  Routing plays an important role in the security of the entire network. The mobility and portability in Mobile Ad-Hoc networks introduces security threats and security attacks.  ... 
doi:10.26483/ijarcs.v8i9.5144 fatcat:pswbfzzw5ffanjiq43ucpsu5qy

An Efficient Mechanism for Network Management in Wireless Mesh Network

Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong Seon Hong
2008 International Conference on Advanced Communication Technology, ICACT  
This mechanism also helps in making routing and security mechanism easy and efficient. 1  ...  Security and network monitoring augment the concerns of efficient management within the network.  ...  Each Router manages its own ad hoc component, providing addresses, routes to destination, authentication and secure communication to nodes present in its ad hoc region.  ... 
doi:10.1109/icact.2008.4493766 fatcat:budmpx3s5jgdnbchzk3h4h4sra

A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey

Rajani B.Patil, Dhanashree Kulkarni
2014 International Journal of Computer Applications  
General Terms Security, secure transmission, routing, wireless ad hoc network, wormhole attack Keywords Shared cryptography, Secure energy efficient ad hoc routing  ...  Objective of this paper is to propose new approach for WSN security, i.e. Secure Energy Efficient ad hoc Routing (SEEAR) that consider cost of providing security and effects on energy efficiency.  ...  Self Organization: Wireless sensor networks are spatial kind of Ad-hoc networks in which every sensor node should be self healing and self organizing.  ... 
doi:10.5120/18871-0506 fatcat:plq56yudozejtasbt3lbnk5yda

Wireless Ad Hoc Sensor Networks

Carlos León, Julio Barbancho, Pawel Kulakowski, Adel Soudani, Pedro Marrón, Chia-Yen Shih
2013 International Journal of Distributed Sensor Networks  
., provides a novel routing algorithm for Mobile Ad hoc Networks (MANETs) focusing on finding paths in dynamic networks and considering security.  ...  The paper "A credible routing based on a novel trust mechanism in ad hoc networks, " by R.  ...  Acknowledgments The guest editors would like to thank the authors for the great level of the contributions included in this special issue and the work developed by many experts who participated in the  ... 
doi:10.1155/2013/202940 fatcat:eb2hrihzkrbzxnbk6ptng6wjhm

Detection of Black Hole in AD- HOC Networks

Sona Malhotra, Sandeep Kumar
2014 International Journal of Computer Applications Technology and Research  
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks.  ...  The security of the DSR protocol is threaded by a particular type of attack called Black Hole attack. Black hole in Ad-hoc networks is a major problem.  ...  Ad hoc On-demand Distance Vector routing (AODV) was broadly accepted network routing protocol for Mobile Ad hoc Network (MANET).  ... 
doi:10.7753/ijcatr0306.1012 fatcat:gwcvwsmlpvfwlj5zuwjhfojb2a

A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad Hoc Network

Neha Parveen Haque
2020 Zenodo  
This research paper focuses on routing techniques in Mobile ad hoc networks and it also deciphers the issues and challenges of Mobile ad hoc networks.  ...  Neha Parveen Haque "A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad-Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd  ...  Security in ad hoc network: Ad hoc wireless network are highly vulnerable to security attack which is prime issue. There is no single node ( centralized node) and no secure protocol is placed.  ... 
doi:10.5281/zenodo.3892460 fatcat:xqqq5ljh65bydoywunbjbtltuy

Trust based Clustering and Secure Authentication for Multicast in AD-Hoc Network

M. EllcyPriana
2014 International Journal of Computer Applications  
Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralized administration, where nodes have limited transmission range.  ...  The multicast protocol with hierarchical routing will increase the scalability.  ...  The self organizing is required in ad-hoc for neighbor discovery, topology organization.  ... 
doi:10.5120/19017-9933 fatcat:6bpb76bpbfhene6zgbbr5iqkvy

Efficient Content Authentication in AdHoc Networks Mitigating DDoS Attacks

Anuj Joshi, Krishna Kant Agrawal
2011 International Journal of Computer Applications  
In this paper, we propose an efficient content authentication method in ad hoc network. Foremost, the challenges in ad hoc networks have been mentioned in this paper.  ...  This paper focuses on secure packet forwarding in ad hoc networks and proposes a new solution based on observation by all the neighboring nodes to mitigate the effects of adverse situations caused by malicious  ...  SECURE ROUTING The basic requirement in ad hoc networks is to organize and adapt the self organized behavior of the participating nodes and the maintenance of an infrastructure less network .The basic  ... 
doi:10.5120/2875-3738 fatcat:lo2x2nh4zfcn3iaknugwyju5vi

A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network

Rammurti Gupta,
2017 International Journal Of Engineering And Computer Science  
In this network, nodes communicate wirelessly which makes securing a mobile ad -hoc network is very challenging.  ...  Mobile Ad hoc Network (MANET) is a Self-wireless network for mobile gadgets.  ...  For these reasons, securing a mobile ad -hoc network is very challenging.  ... 
doi:10.18535/ijecs/v6i5.09 fatcat:yt6wlsfmnbg2vhz7iopvskuuvm

Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks

2011 Journal of Computer Science  
This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks.  ...  Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems.  ...  This study, uses Self-Healing and Optimizing Routing Technique (Short) for mobile ad hoc networks.  ... 
doi:10.3844/jcssp.2011.651.656 fatcat:irlbotqgsnh5jn33mjmam6tfae

SCAN: self-organized network-layer security in mobile ad hoc networks

Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
2006 IEEE Journal on Selected Areas in Communications  
Index Terms-Self-organized security, mobile ad-hoc network, network-layer security.  ...  Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks.  ...  RELATED WORK The secure ad hoc routing problem has attracted substantial attention in recent years. Hu et al.  ... 
doi:10.1109/jsac.2005.861384 fatcat:ydrnpjjbjfcjfpxxpmfvg6vooq

Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Protocol Design  
Secure routing in mobile ad hoc networks A mobile ad hoc network's routing protocol has unique challenges due to the dynamic nature of ad hoc network.  ...  Mobile Ad-Hoc Networks: Protocol Design ARAN: Authenticated Routing for Ad Hoc Networks SAODV: Secure Ad hoc On-demand Distance Vector (SAODV) SLSP: Secure Link-state routing ODSBR: On-Demand Secure Routing  ... 
doi:10.5772/16226 fatcat:sbqpgsved5ewtaw7l3lsioam4a
« Previous Showing results 1 — 15 out of 29,539 results