Security in Mobile Ad Hoc Networks

被引:3
|
作者
Khanpara, Pimal [1 ]
Trivedi, Bhushan [2 ]
机构
[1] Nirma Univ, Inst Technol, Ahmadabad, Gujarat, India
[2] GLS Inst Comp Technol, Ahmadabad, Gujarat, India
关键词
Mobile ad hoc networks; Security; Network layer; Point detection mechanisms; Intrusion detection schemes; INTRUSION DETECTION SYSTEM;
D O I
10.1007/978-981-10-2750-5_52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the proliferation of mobile devices, Mobile Ad hoc Networks (MANETs) are increasing in popularity. However, security of such networks is an important issue as MANETs are vulnerable to various attacks occurring at different layers of TCP/IP protocol suite. This paper focuses on the Network layer vulner-abilities as this layer is responsible for one of the basic MANET functions, routing. This paper describes the existing detection approaches for Network layer attacks. The comparison of the existing security solutions for Network layer attacks is also presented in this paper. Finally, the paper describes the scope of further research.
引用
收藏
页码:501 / 511
页数:11
相关论文
共 50 条
  • [21] A tactical security architecture for mobile ad hoc networks
    Yuen, ST
    Kambhampati, R
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 572 - 577
  • [22] Security model based mobile agent for mobile ad hoc networks
    Ahmed, Maqbol
    Okba, Kazar
    Abdelbasset, Barkat
    Mouadh, Bali
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 22 (01) : 36 - 54
  • [23] A security architecture for multihop mobile ad hoc networks with mobile agents
    Shaikh, Roshan A.
    Shaikh, Zubair A.
    PROCEEDINGS OF THE INMIC 2005: 9TH INTERNATIONAL MULTITOPIC CONFERENCE - PROCEEDINGS, 2005, : 300 - 307
  • [24] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [25] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [26] Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
    Zegzhda, P. D.
    Ivanov, D. V.
    Moskvin, D. A.
    Kubrin, G. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 993 - 999
  • [27] Security Solution for Mobile Ad hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 255 - 262
  • [28] Cooperative Security Schemes for Mobile Ad-Hoc Networks
    Caballero-Gil, P.
    Hernandez-Goya, C.
    COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 286 - 294
  • [29] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [30] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126