Abstract

Security is a key factor in most of the systems used widely in day to day life. Most of the real time applications and systems are facing security problem very often, therefore we have attempted to build a general framework for all existing and future systems. Wireless or mobile networks emerged to replace the wired networks. MANET is an emerging research area with practical applications. This new generation of networks is different from wired one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. However, MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. This article provides an overview of past and current work in the area of security research of mobile ad hoc networks — as well as emerging work in different approaches to provide security features to routing in mobile ad hoc networks (MANET). Authentication, integrity and encryption are the key issues pertaining to network security. Traditional authentication schemes cannot be effectively used in such decentralized networks. Here, we present an end-to-end data authentication scheme that relies on mutual trust between nodes. In Mobile Ad-hoc Networks there must be two security systems: one to protect the data transmission and another one to make the routing secure. There are already well studied point to point security systems that can be used for protecting network transmissions. But there is not much work has been done about how make secure routing in MANET for volatile nodes.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.