The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Network Security: Attacks and Control in MANET
|
Author(s): Mamata Rath (C.V.Raman College of Engineering, India), Jhum Swain (Siksha ‘O' Anusandhan University, India), Bibudhendu Pati (C.V.Raman College of Engineering, India)and Binod Kumar Pattanayak (Siksha ‘O' Anusandhan University, India)
Copyright: 2018
Pages: 19
Source title:
Handbook of Research on Network Forensics and Analysis Techniques
Source Author(s)/Editor(s): Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France)and Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
DOI: 10.4018/978-1-5225-4100-4.ch002
Purchase
|
Abstract
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc Networks (MANETs) the individual nodes are self-reconfigurable according to the changes of the network topology. Joint effort between portable hubs is more critical because they face major challenges such as powerlessness to work safely while protecting its assets and performing secure steering among hubs. With the existence of malicious nodes, one of the principal challenges in MANETs is to outline powerful security arrangement that can shield MANETs from various routing attacks. This chapter highlights major attacks and control mechanism in MANETs with an intention that it will open directions for researchers to explore more in the field of network security. At the end of this chapter, basic security mechanisms and issues related to emergence of IoT from Mobile networks has been highlighted.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|