Security Issues in Mobile Ad Hoc Networks

被引:4
|
作者
Sandoval Orozco, A. L. [3 ]
Garcia Matesanz, J. [4 ]
Garcia Villalba, L. J. [3 ]
Marquez Diaz, J. D. [5 ]
Kim, T. -H. [1 ,2 ]
机构
[1] GVSA, Sch Informat Sci, Hobart, Tas 7001, Australia
[2] UTAS, Hobart, Tas 7001, Australia
[3] Univ Complutense Madrid, Fac Informat, DISIA, GASS, E-28040 Madrid, Spain
[4] Univ Complutense Madrid, Fac Ciencias Matemat, Secc Dept Sistemas Informat & Comp Lenguajes & In, GASS, E-28040 Madrid, Spain
[5] Univ Norte, Grp Redes Comp Ingn Software GRECIS, Dept Ingn Sistemas, Barranquilla, Colombia
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2012年
关键词
AUTOCONFIGURATION; PROTOCOLS;
D O I
10.1155/2012/818054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Ad hoc networks: not an ad hoc field anymore
    Ephremides, A
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05): : 441 - 448
  • [22] RETRACTED: Security in Vehicular Ad-hoc Networks (Retracted Article)
    Sehgal, Umesh
    Kaur, Kuljeet
    Kumar, Pawan
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 485 - +
  • [23] Spanning-tree based autoconfiguration for mobile ad hoc networks
    Longjiang Li
    Yunze Cai
    Xiaoming Xu
    Wireless Personal Communications, 2007, 43 : 1465 - 1477
  • [24] Efficient broadcasting using packet history in mobile ad hoc networks
    Agathos, S.
    Papapetrou, E.
    IET COMMUNICATIONS, 2011, 5 (15) : 2196 - 2205
  • [25] Direction-aware routing protocol for mobile ad hoc networks
    Chung, WH
    Kuo, SY
    Chen, SI
    2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 165 - 169
  • [26] A low overhead address assignment method in mobile ad hoc networks
    Mase, K
    Narita, S
    Yoshida, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (09) : 2467 - 2476
  • [27] A General Framework for Greedy Routing in Mobile Ad-hoc Networks
    Al-shugran, Mahmoud
    Ghazali, Osman
    Hassan, Suhaidi
    2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 349 - 354
  • [28] Staggered Checkpointing and Recovery in Cluster Based Mobile Ad Hoc Networks
    Jaggi, Parmeet Kaur
    Singh, Awadhesh Kumar
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 122 - +
  • [29] Adaptive congestion control scheme in mobile ad-hoc networks
    Sharma, Varun Kumar
    Kumar, Mahesh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (03) : 633 - 657
  • [30] AIPAC: Automatic IP address configuration in mobile ad hoc networks
    Fazio, M.
    Villari, M.
    Puliafito, A.
    COMPUTER COMMUNICATIONS, 2006, 29 (08) : 1189 - 1200