Saturday, November 2, 2019
Security Solutions for MANETs (mobile ad-hoc networks) including the Research Paper
Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS - Research Paper Example Moreover, these diverse issues obviously formulate a situation for developing multi-fence safety answers that attain both wide security as well as enviable network performance (Yang, Luo, Ye, lLu, & Zhang, 2004) and (Nash, 2000). This paper presents a comprehensive analysis mobile ad hoc security issues and offers security solutions for MANETs (mobile ad-hoc networks) including the development of IDS (Intrusion Detections System). This paper is aimed at assessing some of the main aspects of the MANETs (mobile ad-hoc networks) technology and possible security issues. This paper also suggests state-of-the-art security solutions in addition to mitigation actions those can be adopted to formulate better security of wireless communication systems. Introduction As the significance of network and computer communication technologies in our everyday life augments it as well poses new requirements for connectivity. However, the traditional wired technology and communication solutions have been there for an extensive era but there is increasing need of operational and working wireless systems and solutions in all the areas of life such as study, using internet, sending E-mail messages, altering data and information in a convention and so on. However, there exist diverse solutions regarding technology systems to fulfill these requirements. In this scenario, solution could be wireless LAN that is designed on the basis of IEEE 802.11 standard.. On the other hand, there is increasing need or demand for connectivity in circumstances where there is no backbone link or else base station accessible, for instance when two or additional Personal Digital Assistants require to be linked (Rashmi, 2008). MANETs (Mobile ad hoc networks) have intrinsically come up with diverse characteristics as compared to the conventional wired arrangement. However, mobile ad hoc networks have attained considerably growing attention, somewhat due to the possible establishment of the Mobile ad hoc networks to countless purposes. On the other hand, network security is still a vital issue in a mobile ad hoc network which is one of its fundamental weaknesses (Jangra, Goel, Priyanka, & Bhatia, 2010). Mobile ad hoc networks can be established at any place without some particular need for outside arrangement (similar to base stations or wires). Since they are frequently mobile and that is why a term ââ¬Ëmobile ad hoc networksââ¬â¢ is frequently employed when talking on the subject of Ad-hoc networks. Moreover, mobile ad hoc networks are frequently expressed as a self-governing system of mobile routers (as well as linked terminals) which are connected to each other through wireless connection, the merger of that shapes a casual chart. In this scenario, th e networkââ¬â¢s routers can be moved randomly and standardize themselves impartially; as a result,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.