Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - Internet, neue Technologien

Security Issues In Mobile Ad-Hoc Network & Solutions

Network security

Titel: Security Issues In Mobile Ad-Hoc Network & Solutions

Forschungsarbeit , 2011 , 6 Seiten

Autor:in: Ali Raheem (Autor:in)

Informatik - Internet, neue Technologien
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Network has become a very important aspect in the technology development because it has the biggest effect on the communication between people, exchange and share resources. Network is a group of computers and other devices connected together in order to allow information to be exchanged or shared between each other. Having a high level of security in any system in network has become the desire that most of people want to reach. Therefore, the intention of this paper is to explore the security Issues in mobile Ad-hoc network. The paper has been divided into five impotent sections. The first section discusses the weaknesses or vulnerabilities in mobile Ad-hoc network. The second section mentions the types of Attack in mobile Ad-hoc network. The third discusses the routing protocols in mobile Ad-hoc network. Fourth, discusses the goals security of mobile Ad-hoc network. Finally, the paper will offer security solutions for mobile Ad-hoc network which can provide a high performance security to mobile Ad-hoc network.

Leseprobe


Table of Contents

I. INTRODUCTION

II. VULNERABILITIES OF THE MOBILE AD-HOC NETWORK

III. THE TYPES OF ATTACK IN MOBILE AD-HOC NETWORK

IV. ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

A. Table Driven protocols

B. Demand Protocols:

C. Hybrid Protocols:

V. SECURITY GOALS OF MOBILE AD-HOC NETWORK

A. Malicious altering

B. Accidental altering

VI. SECURITY SOLUTIONS FOR MOBILE AD-HOC NETWORK

VII. FUTURE WORK

VIII. CONCLUSION

Research Objectives and Themes

This paper aims to explore the inherent security challenges within mobile Ad-hoc networks (MANETs). The research objective is to identify critical vulnerabilities, analyze existing routing protocols, and evaluate security goals to propose robust solutions that ensure high-performance protection for wireless mobile communication.

  • Vulnerabilities and security weaknesses in mobile Ad-hoc network architectures
  • Categorization of security attacks and their impact on network performance
  • Analysis of routing protocols (Table-driven, Demand, and Hybrid)
  • Security objectives including availability, integrity, and confidentiality
  • Implementation of cryptographic solutions, specifically symmetric and public key infrastructure

Excerpt from the Book

II. VULNERABILITIES OF THE MOBILE AD-HOC NETWORK

Before suggesting solutions for the security problems in mobile Ad-hoc network, it is necessary first to understand the vulnerabilities of this network and the difficulties that usually affect the performance of the mobile Ad-hoc network .To begin with, the heaviest elements of these weaknesses that actually minimize the efficiency of the Ad-hoc network are five in number. [4]

Firstly, the lack of secure boundaries in mobile Ad-hoc network is the major deficiency and simultaneously the biggest difference from the wired traditional network which has a solid line defense that can protect it from any attacks. As a matter of fact, this vulnerability in mobile Ad-hoc network is originated from the exact nature of the structure of mobile Ad hoc network .more specifically the nodes themselves are able to move inside the network and leave their places freely and haphazardly. On the other hand, to get access to the wired network means that the user needs to pass through different kind of protection walls such as firewall and gateway. Whereas in mobile Ad-hoc network, there is no need for adversary to gain the physical access to the network.

Summary of Chapters

I. INTRODUCTION: Provides an overview of network technology and defines the self-configuring nature of mobile Ad-hoc networks (MANETs).

II. VULNERABILITIES OF THE MOBILE AD-HOC NETWORK: Discusses the structural weaknesses of MANETs, including lack of secure boundaries, compromised nodes, and power supply limitations.

III. THE TYPES OF ATTACK IN MOBILE AD-HOC NETWORK: Differentiates between external and internal attacks and their respective impacts on network traffic and security.

IV. ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK: Examines three categories of routing protocols: Table-driven, Demand, and Hybrid protocols, highlighting their operational mechanics.

V. SECURITY GOALS OF MOBILE AD-HOC NETWORK: Outlines the essential criteria for secure network operation, such as availability, integrity, authenticity, and non-repudiation.

VI. SECURITY SOLUTIONS FOR MOBILE AD-HOC NETWORK: Proposes cryptographic solutions, focusing on symmetric key algorithms and public key infrastructure (PKI) using digital signatures.

VII. FUTURE WORK: Suggests potential advancements in security, such as the implementation of RSA encryption, to further harden the network against unauthorized access.

VIII. CONCLUSION: Summarizes the study’s findings on security threats and emphasizes the necessity of robust cryptographic measures for protecting data in mobile environments.

Keywords

Mobile Ad-hoc Network, MANET, Network Security, Routing Protocols, Cryptography, Vulnerability, Authentication, Data Integrity, Symmetric Key, Public Key Infrastructure, Digital Signature, Network Defense, Wireless Communication, Firewall, Node Mobility

Frequently Asked Questions

What is the primary focus of this research paper?

The paper focuses on identifying security challenges within mobile Ad-hoc networks (MANETs) and proposing effective technological solutions to mitigate these risks.

What are the core thematic areas covered in the document?

The study covers network vulnerabilities, types of malicious attacks, the role of various routing protocols, and established security goals like confidentiality and integrity.

What is the main objective of the research?

The main objective is to provide a comprehensive security framework for mobile Ad-hoc networks that can prevent unauthorized access and protect transmitted data.

Which scientific methodologies are employed?

The paper utilizes a comparative analysis of routing protocols and an evaluation of cryptographic encryption methods, including symmetric and public key techniques.

What topics are discussed in the main body?

The main body covers the inherent weaknesses of MANETs due to node mobility, a classification of attacks, details on routing mechanisms, and the application of digital certificates for authentication.

How can these findings be summarized by keywords?

The work is characterized by terms such as MANET, Network Security, Cryptography, Public Key Infrastructure, and Routing Protocols.

Why is node mobility considered a significant security risk?

Node mobility makes it difficult to maintain secure boundaries, as nodes frequently join and leave the network, preventing the implementation of fixed defensive perimeters like firewalls.

How do hybrid protocols differ from table-driven and demand protocols?

Hybrid protocols are designed to minimize control overhead by combining features of both proactive (table-driven) and reactive (on-demand) approaches, optimizing the discovery and maintenance of routes.

What role does the Key Distribution Center (KDC) play in network security?

The KDC facilitates secure communication by managing and distributing keys, which allows nodes to encrypt and decrypt data effectively.

Ende der Leseprobe aus 6 Seiten  - nach oben

Details

Titel
Security Issues In Mobile Ad-Hoc Network & Solutions
Untertitel
Network security
Hochschule
( Middlesex University in London )
Veranstaltung
Telecommunication Engineering
Autor
Ali Raheem (Autor:in)
Erscheinungsjahr
2011
Seiten
6
Katalognummer
V200703
ISBN (eBook)
9783656278351
ISBN (Buch)
9783656278405
Sprache
Englisch
Schlagworte
AD-Hoc Network Security Ad-hoc Security public key private key encryption certificate authority
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Ali Raheem (Autor:in), 2011, Security Issues In Mobile Ad-Hoc Network & Solutions, München, GRIN Verlag, https://www.grin.com/document/200703
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  6  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum