scholarly journals A Novel Approach Certificate Revocation in MANET using Fuzzy logic

Author(s):  
Jayanthi. E ◽  
Mohammed Ali Hussain

<span lang="EN-US">Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their wireless and vibrant features make them susceptible to wide range of types of security attacks when compared to the traditional wired networks. The prime challenge is to assure security in the network components and services. To work out the challenge, novel security measures are put forward for effective and secured communication. In our proposed work, we discuss the need for Security in MANET, focusing on certificate revocation. Providing security is challenging tasks due to its key features. Different authentication techniques, Digital certificate and components of Public Key Infrastructure are also discussed. The certificate revocation is a challenging task in MANETs due to absence of centralized repositories and trusted authorities. The different methods of certificate revocation using cluster based mechanism is analyzed and compared. The principle, advantages and disadvantages of certificate revocation are also compared. And the novel Certificate revocation techniques using fuzzy is discussed with reduced overhead.</span>

Author(s):  
Muhammad Mahmudul Islam ◽  
Ronald Pose ◽  
Carlo Kopp

Ad-hoc networks have been the focus of research interest in wireless networks since 1990. Nodes in an ad-hoc network can connect to each other dynamically in an arbitrary manner. The dynamic features of ad-hoc networks demand a new set of routing protocols that are different from the routing schemes used in traditional wired networks. A wide range of routing protocols has been proposed to overcome the limitations of wired routing protocols. This chapter outlines the working mechanisms of state-ofthe- art ad-hoc routing protocols. These protocols are evaluated by comparing their functionalities and characteristics. Related research challenges are also discussed.


2013 ◽  
pp. 81-101
Author(s):  
Victor Pomponiu

The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.


2015 ◽  
Vol 2 (2) ◽  
pp. 9-15
Author(s):  
Balasubramanian T

In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as link-state or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.


Author(s):  
Victor Pomponiu

The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


Sign in / Sign up

Export Citation Format

Share Document