Security Aspects and Challenges in Mobile Adhoc Networks

Full Text (PDF, 447KB), PP.26-32

Views: 0 Downloads: 0

Author(s)

G. Jose Moses 1,* P. Suresh Varma 1 N.Supriya 1 G. Naga Satish 1

1. Department of Computer Science, Adikavi Nannaya University, Rajahmundry,A.P.INDIA

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.06.04

Received: 18 Sep. 2011 / Revised: 5 Jan. 2012 / Accepted: 17 Mar. 2012 / Published: 8 Jun. 2012

Index Terms

Adhoc Wireless Networks, Routing, Security, Topology

Abstract

The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The Adhoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium and network topology. These challenges clearly make a case for building multifence security solutions that achieve both road protection and desirable network performance. The general security objectives like authentication, confidentiality, integrity, availability and non-repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze Challenges, Overview of Security, attacks, threats faced by the Adhoc network environment and provide a classification of the various security mechanisms.

Cite This Paper

G.Jose Moses, P.Suresh Varma, N.Supriya, G.NagaSatish, "Security Aspects and Challenges in Mobile Adhoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.6, pp.26-32, 2012. DOI:10.5815/ijcnis.2012.06.04

Reference

[1]L. Zhou and Z.J. Haas, "Securing Ad hoc Networks", IEEE Networks, 13(6): 24- 30, Nov/Dec 1999.
[2]"Security Technologies in Wireless Networks" Tayseer Fath Elrahman.
[3]H. Anthony Chan. Wireless data networks and systems, Lecture notes, University of Cape Town, http://www.local.eleceng.uct.ac.za/staff/achan/eee458/security/. May, 2004.
[4]Karan Singh, R. S. Yadav, Ranvijay "A Review Paper On Ad Hoc Network Security"
[5]Yih-chun hu, adrian perrig, "A Survey of Secure Wireless ad hoc routing" IEEE security & privacy May-June 2004
[6]F. Anjum, Anup K. Ghosh, nada golmie, paul kolodzy, radha poovendran, rajeev shorey, d. Lee, j-sac, "Security in Wireless Ad hoc Networks", ieee journal on selected areas in communications, vol. 24, no. 2, February 2006.
[7]H.-A. Wen, C.-L. Lin, and T. Hwang, "Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients," Computers and Security, vol. 25, pp. 106-113,2006.
[8]Yuh-Ren Tsai, Shiuh-Jeng Wang, "Routing Security and Authentication Mechanism for Mobile Ad Hoc Networks" Chung-Shan Institute of Science and Technology, Taiwan, R.O.C., under Grant BC-93-B14P and the National Science Council, Taiwan, R.O.C., IEEE 2004.
[9]K.Seshadri Ramana, Dr. A.A. Chari, Prof. N.Kasiviswanth, "A Survey On Trust Management For Mobile Ad Hoc Networks" April 2010.
[10]Nishu Garg and R.P. Mahapatra, "MANET Security Issues". In IJCSNS International Journal of Computer Science and Network Security, 9, No.8, August 2009.
[11]Er. Tushar Gohil "Overview of Security Threats in Mobile Ad-hoc Network", Journal of High Performance Communication Systems and Networking Volume. 2 (1-2), January-December 2010, pp. 1–10.