Security & Cooperation Mechanisms Over Mobile Ad hoc Networks: A Survey and Challenges

被引:0
作者
Amraoui, Hicham [1 ]
Habbani, Ahmed [1 ,2 ]
Hajami, Abdelmajid [3 ]
Bilal, Essaid [4 ]
机构
[1] Mohammed V Univ, SIME Lab, ENSIAS, Rabat, Morocco
[2] ENSIIE, SAMOVAR Lab, Paris, France
[3] Hassan I Univ, FST, LAVETE Lab, Settat, Morocco
[4] Mohammed VI Univ, Benghrir, Morocco
来源
PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017) | 2017年
关键词
MANETs; CIMANETs; Security; Internet Architecture; attacks; GAME-THEORETIC APPROACH; INTRUSION-DETECTION; ENHANCEMENTS; MODEL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In our everyday life, we are very interested in wireless connection technologies. In addition, the use of mobile devices and applications which are based on wireless networking is continuously increasing day after day. As the future Internet architecture, security concept can offer superior architectural support for Mobile Ad Hoc Networks (MANETs). Therefore, this concept, which is an important cross-cutting research field, is gradually forming. The key novelty of this paper, is to provide the references and guidelines to well guide the readers approaching studies on the new research fields about this concept. First of all, we introduce the background of MANETs and analyze its development trends, and then interpret security requirements and sketch an overview about challenges and attacks in such networks. Subsequently, we define, for the first time a new research field entitled Cooperative Internet of MANETs (CIMANET) which will be introduced as the new cross-cutting area. In addition, we provide a description of many existing security algorithms with a comparative analysis of these various mechanisms.
引用
收藏
页数:6
相关论文
共 31 条
[1]  
Abirami K. Rama, 2013, 2013 International Conference on Advanced Computing and Communication Systems (ICACCS), P1, DOI 10.1109/ICACCS.2013.6938709
[2]   Trust-based security for the OLSR routing protocol [J].
Adnane, Asma ;
Bidan, Christophe ;
de Sousa Junior, Rafael Timoteo .
COMPUTER COMMUNICATIONS, 2013, 36 (10-11) :1159-1171
[3]   Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model [J].
Amraoui, Hicham ;
Habbani, Ahmed ;
Hajami, Abdelmajid ;
Bilal, Essaid .
MOBILE INFORMATION SYSTEMS, 2016, 2016
[4]  
Amraoui H, 2014, I C COMP SYST APPLIC, P326, DOI 10.1109/AICCSA.2014.7073216
[5]   FITS: A Finite-Time Reputation System for Cooperation in Wireless Ad Hoc Networks [J].
Chen, Tingting ;
Wu, Fan ;
Zhong, Sheng .
IEEE TRANSACTIONS ON COMPUTERS, 2011, 60 (07) :1045-1056
[6]  
Clausen T., 2003, Optimized link state routing protocol (OLSR)
[7]   Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory [J].
Das, Debjit ;
Majumder, Koushik ;
Dasgupta, Anurag .
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 :92-101
[8]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[9]   Collaborative caching priority for processing requests in MANETs [J].
Elfaki, Mohamed Ahmed ;
Ibrahim, Hamidah ;
Mamat, Ali ;
Othman, Mohamed ;
Safa, Haidar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :85-96
[10]  
Guan Q., 2012, IEEE T VEH TECHNOL, V61