DocumentCode :
2165679
Title :
A survey on: An analysis of secure routing of volatile nodes in MANET
Author :
Verma, M.K. ; Joshi, S. ; Doohan, N.V.
Author_Institution :
Dept. of Inf. Technol., Sushila Devi Bansal Coll. of Technol., Indore, India
fYear :
2012
fDate :
5-7 Sept. 2012
Firstpage :
1
Lastpage :
3
Abstract :
Security is a key factor in most of the systems used widely in day to day life. Most of the real time applications and systems are facing security problem very often, therefore we have attempted to build a general framework for all existing and future systems. Wireless or mobile networks emerged to replace the wired networks. MANET is an emerging research area with practical applications. This new generation of networks is different from wired one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. However, MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. This article provides an overview of past and current work in the area of security research of mobile ad hoc networks - as well as emerging work in different approaches to provide security features to routing in mobile ad hoc networks (MANET). Authentication, integrity and encryption are the key issues pertaining to network security. Traditional authentication schemes cannot be effectively used in such decentralized networks. Here, we present an end-to-end data authentication scheme that relies on mutual trust between nodes. In Mobile Ad-hoc Networks there must be two security systems: one to protect the data transmission and another one to make the routing secure. There are already well studied point to point security systems that can be used for protecting network transmissions. But there is not much work has been done about how make secure routing in MANET for volatile nodes.
Keywords :
cryptography; message authentication; mobile ad hoc networks; routing protocols; telecommunication network topology; telecommunication security; MANET; authentication schemes; constrained capability; data authentication; decentralized networks; distributed cooperation; dynamic topology; encryption; mobile ad hoc networks; mutual trust; network infrastructure; network security; routing protocols; secure routing; security problem; volatile nodes; Cryptography; Mobile ad hoc networks; Mobile communication; Mobile computing; Routing; Authentication; confidentiality; cryptography; encryption; integrity MANET;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (CONSEG), 2012 CSI Sixth International Conference on
Conference_Location :
Indore
Print_ISBN :
978-1-4673-2174-7
Type :
conf
DOI :
10.1109/CONSEG.2012.6349506
Filename :
6349506
Link To Document :
بازگشت