Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks

Abstract

"The rising concern for beneficial, easy design and deployable, flexible, reliable, cost effective and scalable wireless network has led to the evolution of mobile Ad hoc networks MANETs . This type of network in its own peculiarity is a wireless, mobile, infrastructure less network technology. It has been found to be very useful in military, commercial, personal, emergency related applications but not without some security challenges. The security of MANET is an important challenge to network engineers due to its unmonitored deployment nature and inherent resource limitation. This paper presents a study of some of these security issues that militate against ad hoc network technology design, deployment and operation. Possible counter measures required to overcome these challenges are also presented. Nwabueze, C. A | Usiade, R. E ""Security Vulnerability and Counter Measures in Mobile Ad-Hoc Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30107.pdf Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30107/security-vulnerability-and-counter-measures-in-mobile-ad-hoc-networks/nwabueze-c-a"

Authors and Affiliations

Nwabueze, C. A | Usiade, R. E

Keywords

Related Articles

Analyzing Titanic Disaster using Machine Learning Algorithms

Titanic disaster occurred 100 years ago on April 15, 1912, killing about 1500 passengers and crew members. The fateful incidents still compel the researchers and analysts to understand what could have led to the survival...

SOWA-RIGPA Tibetan System of Medicine

Pyaemia is a type of blood infection that leads to widespread abscesses of a metastatic nature. It is usually caused by the staphylococcus bacteria or by pus-forming organisms in the blood. It is a life-threatening condi...

Development and Characterization of Cardanol Based Polymer Reinforced Fibre Bicomposites

The emerging quest for optimal use of naturally obtained resources through advanced technigues and products has escalated research and exploration of naturally oriented renewable materials. In present investigation, card...

Cross Pose Facial Recognition Method for Tracking any Person's Location an Approach

In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most...

Analytical Study of Municipal Solid Waste Characteristics at Deonar Dumping Yard in Mumbai Region, Maharashtra, India

Waste management is an international sensation, rising population, industrialization and urbanization are accountable to produce a tremendous amount of waste. Today's daily waste generation rate is about 760,000 tons. By...

Download PDF file
  • EP ID EP685989
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

C. A (2020). Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks. International Journal of Trend in Scientific Research and Development, 4(2), -. https://europub.co.uk./articles/-A-685989