Affiliation:
1. C.V.Raman College of Engineering, India
2. Siksha ‘O' Anusandhan University, India
Abstract
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc Networks (MANETs) the individual nodes are self-reconfigurable according to the changes of the network topology. Joint effort between portable hubs is more critical because they face major challenges such as powerlessness to work safely while protecting its assets and performing secure steering among hubs. With the existence of malicious nodes, one of the principal challenges in MANETs is to outline powerful security arrangement that can shield MANETs from various routing attacks. This chapter highlights major attacks and control mechanism in MANETs with an intention that it will open directions for researchers to explore more in the field of network security. At the end of this chapter, basic security mechanisms and issues related to emergence of IoT from Mobile networks has been highlighted.
Reference85 articles.
1. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks
2. Airehrour, D., & Gutierrez, J. A. (2015). An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing. In CONF-IRM (p. 17).
3. Node centric load balancing routing protocol for mobile ad hoc networks.;A.Ali;Proceeding of International MultiConference of Enginners Computer Scientists,2012
4. Receiver-based AODV routing protocol for MANETs
5. Energy efficient zone based routing protocol for MANETs
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献