Network has become a very important aspect in the technology development because it has the biggest effect on the communication between people, exchange and share resources. Network is a group of computers and other devices connected together in order to allow information to be exchanged or shared between each other. Having a high level of security in any system in network has become the desire that most of people want to reach. Therefore, the intention of this paper is to explore the security Issues in mobile Ad-hoc network. The paper has been divided into five impotent sections. The first section discusses the weaknesses or vulnerabilities in mobile Ad-hoc network. The second section mentions the types of Attack in mobile Ad-hoc network. The third discusses the routing protocols in mobile Ad-hoc network. Fourth, discusses the goals security of mobile Ad-hoc network. Finally, the paper will offer security solutions for mobile Ad-hoc network which can provide a high performance security to mobile Ad-hoc network.
Inhaltsverzeichnis (Table of Contents)
- I. Introduction
- II. Vulnerabilities of the Mobile Ad-hoc Network
- III. The Types of Attack in Mobile Ad-hoc Network
- 1. The external attacks
- 2. The internal attacks
- IV. Routing Protocols in Mobile Ad-hoc Network
- A. Table Driven protocols
- B. Demand Protocols:
- C. Hybrid Protocols:
- V. Security Goals of Mobile Ad-hoc Network
- VI. Security Solutions for Mobile Ad-hoc Network
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This paper aims to explore the security issues of mobile Ad-hoc networks by examining their vulnerabilities, different types of attacks, and routing protocols. It also discusses the security goals and offers potential solutions to enhance the security performance of these networks.
- Vulnerabilities of Mobile Ad-hoc Networks
- Types of Attacks in Mobile Ad-hoc Networks
- Routing Protocols for Mobile Ad-hoc Networks
- Security Goals for Mobile Ad-hoc Networks
- Security Solutions for Mobile Ad-hoc Networks
Zusammenfassung der Kapitel (Chapter Summaries)
The paper begins by introducing the concept of mobile Ad-hoc networks and outlining the importance of security in this context. It then delves into the vulnerabilities of these networks, including the lack of secure boundaries, compromised nodes, centralized management, and power supply issues.
The next section examines the different types of attacks faced by mobile Ad-hoc networks, classifying them into external and internal attacks. The paper then explores various routing protocols used in these networks, including table-driven, demand, and hybrid protocols.
The chapter on security goals defines key criteria for assessing the security of mobile Ad-hoc networks, such as availability, integrity, confidentiality, authenticity, non-repudiation, authorization, and anonymity.
Schlüsselwörter (Keywords)
This paper focuses on the security challenges of mobile Ad-hoc networks, covering topics like vulnerabilities, attacks, routing protocols, and security goals. Key terms include mobile Ad-hoc network (MANET), secure boundaries, compromised nodes, routing protocols, table-driven protocols, demand protocols, hybrid protocols, security goals, availability, integrity, confidentiality, authenticity, non-repudiation, authorization, and anonymity. It explores potential solutions for improving the security of mobile Ad-hoc networks through methods such as symmetric key algorithms, public key cryptography, and digital signature certificates.
- Quote paper
- Ali Raheem (Author), 2011, Security Issues In Mobile Ad-Hoc Network & Solutions, Munich, GRIN Verlag, https://www.grin.com/document/200703