About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ew 18(20): e13

Research Article

A Survey on Security Issues and Challenges in Mobile Ad-hoc Network

Download1100 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.12-9-2018.155743,
        author={G. Keerthana and P. Anandan},
        title={A Survey on Security Issues and Challenges in Mobile Ad-hoc Network},
        journal={EAI Endorsed Transactions on Energy Web and Information Technologies},
        volume={5},
        number={20},
        publisher={EAI},
        journal_a={EW},
        year={2018},
        month={9},
        keywords={MANET, Mobile Ad-hoc, IEEE802.11, vulnerability, authenticity, offenses, ad hoc networks},
        doi={10.4108/eai.12-9-2018.155743}
    }
    
  • G. Keerthana
    P. Anandan
    Year: 2018
    A Survey on Security Issues and Challenges in Mobile Ad-hoc Network
    EW
    EAI
    DOI: 10.4108/eai.12-9-2018.155743
G. Keerthana1,*, P. Anandan2
  • 1: Research Scholar, Anna University, Chennai.
  • 2: Professor, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai.
*Contact email: gkeerthu21@gmail.com

Abstract

Rapid developments in the communication arena has tremendously improved the transmission procedures today. The amount of information transmission in the commercial and military applications has grown tremendously therefore the need for security concerns have also grown simultaneously since these applications involve in the transmission of confidential contents. Information transmissions in wireless networks appear to be confidential, hence it becomes mandatory to safeguard these contents from the various available offenses by means of devising suitable security mechanisms. Various types of attacks have been observed in the ad hoc networks, namely, the active and passive types, internal and external types. Integrity, identity and privacy are the three major parameters to be ensured in the design of a secure network. This survey paper discusses about the various attacks on a network together with the essential security procedures to be incorporated for securing the network.

Keywords
MANET, Mobile Ad-hoc, IEEE802.11, vulnerability, authenticity, offenses, ad hoc networks
Received
2018-07-09
Accepted
2018-09-07
Published
2018-09-12
Publisher
EAI
http://dx.doi.org/10.4108/eai.12-9-2018.155743

Copyright © 2018 G.Keerthana et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL