Security Attacks and Defensive Measures For Routing
نویسنده
چکیده
Indispensable feature of MANETs is security. MANET is a sort of wireless network communications that can construct itself on the run. One of the significant properties of MANET is dynamic organization. To lodge the varying topology and to provide security, well defined routing algorithms are needed. No protocols detain all the security attacks and provide strategies to prevent them. A network layer protocol is necessary to incorporate all security solution to protect both route and data forwarding operations. The aim of this paper is to analyze security issues and their countermeasures in the ad hoc network layer environment. We discuss the hazards on the network layer and various security protocols.
منابع مشابه
Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey
Indispensable feature of MANETs is security. MANET is a sort of wireless network communications that can construct itself on the run. One of the significant properties of MANET is dynamic organization. To lodge the varying topology and to provide security, well defined routing algorithms are needed. No protocols detain all the security attacks and provide strategies to prevent them. A network l...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012