• Corpus ID: 55002374

A Survey on Safety Intimidations in Mobile Ad-Hoc Networks

@inproceedings{Singh2017ASO,
  title={A Survey on Safety Intimidations in Mobile Ad-Hoc Networks},
  author={Sukhwant Singh and Farminder Singh},
  year={2017}
}
A Mobile Ad Hoc Network is a self-configuring network and they are very impressive for army infrastructures in aggressive battlefield environments. In such conditions, the capability to interconnect secret information effectively in the existence of attacker is very tough. Attackers may challenge both passive and active type of attacks in addition to non-authorized access to categorize, adjust or disturb the information process. Nodes generally share the same physical media; they transmit… 

Figures from this paper

References

SHOWING 1-10 OF 13 REFERENCES
Security: A Core Issue in Mobile Ad hoc Networks
TLDR
This paper shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis ofnetwork attacks, and propose solutions to meet the security challenges.
Study on Security Issues of Mobile Ad Hoc Networks
TLDR
Considering the special characteristics and the spplication environment of Ad Hoc networks, some reviews on some important sub-areas of security, including security arehitecture and key management, are made.
The Black-Hole Node Attack in MANET
  • N. Sharma, A. Sharma
  • Computer Science
    2012 Second International Conference on Advanced Computing & Communication Technologies
  • 2012
TLDR
Computer simulation shows that in comparison to the original ad hoc on demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause time at a minimum cost of the delay in the networks.
Identity-based security systems for vehicular ad-hoc networks
TLDR
This paper presents a security framework for car-to-car VANETs based on a protocol for the distributed generation of signing keys that overcome key escrow issues.
“Energy Efficient, Secure and Stable Routing Protocol for MANET”
TLDR
An effort has been done to combine these factors of security, power and stable routing by proposing a new protocol EESSRP (Energy Efficient, Secure and Stable Routing Protocol) and it has been concluded that the proposed protocol provides energy efficient, secure andstable routing strategy for mobile adhoc networks.
Performance Evaluation of Security Algorithms for the AODV MANET Routing Protocol
TLDR
A unified simulation framework which defines the simulation tools and configuration settings for researchers to perform comparative simulations and test the performance of security tools for the AODV MANET routing protocol is described.
An approach toward the optimization of witness based node clone attack
TLDR
The detection level, memory, and energy overhead of LSM, RED and proposed protocol and an approach for the optimization of witness based distributed node clone detection are presented.
Analysis and Parameterized Evaluation of Impact of Wormhole Attack Using AODV Protocol in MANET
TLDR
The impact of wormhole attack is analysed with Ad Hoc on demand Distance Vector Routing protocol with results showing that throughput and the number of cache replies are increased up to 50% in the presence of malicious nodes and the end to end delay is increased randomly.
Cumulative Techniques for Overcoming Security Threats in Manets
TLDR
This paper has in sighted into various security providing techniques that have cumulated from many years and attempted to present the current approaches for developing secured systems.
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
TLDR
Instead of detecting wormholes from the role of administrators as in previous methods, a new protocol is implemented, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions.
...
...