Security Issues in Mobile Ad Hoc Networks

被引:4
|
作者
Sandoval Orozco, A. L. [3 ]
Garcia Matesanz, J. [4 ]
Garcia Villalba, L. J. [3 ]
Marquez Diaz, J. D. [5 ]
Kim, T. -H. [1 ,2 ]
机构
[1] GVSA, Sch Informat Sci, Hobart, Tas 7001, Australia
[2] UTAS, Hobart, Tas 7001, Australia
[3] Univ Complutense Madrid, Fac Informat, DISIA, GASS, E-28040 Madrid, Spain
[4] Univ Complutense Madrid, Fac Ciencias Matemat, Secc Dept Sistemas Informat & Comp Lenguajes & In, GASS, E-28040 Madrid, Spain
[5] Univ Norte, Grp Redes Comp Ingn Software GRECIS, Dept Ingn Sistemas, Barranquilla, Colombia
关键词
AUTOCONFIGURATION; PROTOCOLS;
D O I
10.1155/2012/818054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [42] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [43] Cooperative Security Schemes for Mobile Ad-Hoc Networks
    Caballero-Gil, P.
    Hernandez-Goya, C.
    [J]. COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 286 - 294
  • [44] Security Solution for Mobile Ad hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    [J]. ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 255 - 262
  • [45] Multipath routing in mobile ad hoc networks: Issues and challenges
    Mueller, S
    Tsang, RP
    Ghosal, D
    [J]. PERFORMANCE TOOLS AND APPLICATIONS TO NETWORKED SYSTEMS, 2004, 2965 : 209 - 234
  • [47] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [48] An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
    Sathishkumar Alampalayam
    Anup Kumar
    [J]. Wireless Personal Communications, 2004, 29 : 263 - 281
  • [49] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126
  • [50] Security in mobile ad hoc and sensor networks: Part I
    Kartalopoulos, Stamatios V.
    Chen, Hsiao-Hwa
    Freire, Mario
    He, Liwen
    Verma, Pramode
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) : 102 - 103