StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS - Research Paper Example

Cite this document
Summary
As compared to wired communication networks, the distinctive uniqueness of mobile ad hoc networks shows a number of significant issues to network security designing structure, like that open peer-to-peer network structure, strict resource limitations, collective wireless means as well as extremely influential network physical layout or topology. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS
Read Text Preview

Extract of sample "Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS"

?SECURITY SOLUTIONS FOR MANETS (MOBILE AD-HOC NETWORKS) INCLUDING THE DEVELOPMENT OF IDS Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS Author Author Affiliation Date Table of Contents Abstract 3 Introduction 3 MANET Technology Overview 5 Security Issues in MANET 6 Security Solutions for MANET 8 Security Principles for MANET 8 Availability 9 Integrity 9 Confidentiality 10 Authenticity 10 Nonrepudiation 10 Authorization 11 Anonymity 11 Security Management Methods for MANET 12 Intrusion Detection Techniques 12 IDS Techniques in MANET 13 Cluster Based IDS 14 Misbehavior Detection 15 Secure Routing Method 16 Conclusion 18 References 18 Abstract In mobile or computer networks the privacy and security have turned out to be prime concerns in an attempt to offer secured transmissions among portable terminals in a threatening framework. As compared to wired communication networks, the distinctive uniqueness of mobile ad hoc networks shows a number of significant issues to network security designing structure, like that open peer-to-peer network structure, strict resource limitations, collective wireless means as well as extremely influential network physical layout or topology. Moreover, these diverse issues obviously formulate a situation for developing multi-fence safety answers that attain both wide security as well as enviable network performance (Yang, Luo, Ye, lLu, & Zhang, 2004) and (Nash, 2000). This paper presents a comprehensive analysis mobile ad hoc security issues and offers security solutions for MANETs (mobile ad-hoc networks) including the development of IDS (Intrusion Detections System). This paper is aimed at assessing some of the main aspects of the MANETs (mobile ad-hoc networks) technology and possible security issues. This paper also suggests state-of-the-art security solutions in addition to mitigation actions those can be adopted to formulate better security of wireless communication systems. Introduction As the significance of network and computer communication technologies in our everyday life augments it as well poses new requirements for connectivity. However, the traditional wired technology and communication solutions have been there for an extensive era but there is increasing need of operational and working wireless systems and solutions in all the areas of life such as study, using internet, sending E-mail messages, altering data and information in a convention and so on. However, there exist diverse solutions regarding technology systems to fulfill these requirements. In this scenario, solution could be wireless LAN that is designed on the basis of IEEE 802.11 standard. On the other hand, there is increasing need or demand for connectivity in circumstances where there is no backbone link or else base station accessible, for instance when two or additional Personal Digital Assistants require to be linked (Rashmi, 2008). MANETs (Mobile ad hoc networks) have intrinsically come up with diverse characteristics as compared to the conventional wired arrangement. However, mobile ad hoc networks have attained considerably growing attention, somewhat due to the possible establishment of the Mobile ad hoc networks to countless purposes. On the other hand, network security is still a vital issue in a mobile ad hoc network which is one of its fundamental weaknesses (Jangra, Goel, Priyanka, & Bhatia, 2010). Mobile ad hoc networks can be established at any place without some particular need for outside arrangement (similar to base stations or wires). Since they are frequently mobile and that is why a term ‘mobile ad hoc networks’ is frequently employed when talking on the subject of Ad-hoc networks. Moreover, mobile ad hoc networks are frequently expressed as a self-governing system of mobile routers (as well as linked terminals) which are connected to each other through wireless connection, the merger of that shapes a casual chart. In this scenario, the network’s routers can be moved randomly and standardize themselves impartially; as a result, the network's wireless topology can be altered quickly as well as accidentally. Furthermore, this type of network can be implemented in a separate manner, or can be linked to the any large size network (Rashmi, 2008). MANET Technology Overview A MANET is an independent collection of mobile users that communicate over fairly bandwidth controlled wireless links. In other words, ad-hoc network technologies are the networks those are not (essentially) linked to some fixed (for example wired) arrangements. An ad-hoc network is a local area network or some sort of other small network, particularly one using wireless links, in that a number of the network communication devices are fraction of the network simply for the period of a communications meeting or, in the scenario of mobile or moveable communication system contrivances, as in a number of close nearness to the whole of the network framework (Rashmi, 2008), (The National Institute of Standards and Technology , 2008) and (Bakht, 2011). The ad-hoc network is an information communication network without a pre-established network arrangement. Additionally, in mobile communication networks, there is a network arrangement that is demonstrated through the radio network regulators, base-stations, etc. In addition, in ad-hoc communication networks each data communication terminal (radio terminal) corresponds with its associate to carry out peer to peer data transfer and communication. However, if the necessary radio terminal is not a neighbor to the commenced call radio terminal (exterior the range of radio terminal), after that the additional middle RTs are employed to carry out the communication connection. This kind of communication is known as multi-hope peer to peer data or information communication. Moreover, this association among the radio terminals is extremely significant in the ad-hoc networks. In ad-hoc networks the entire communication network practices have to be dispersed all through the communication hosts or terminals (Rashmi, 2008), (Bakht, 2011) and (Papadimitratos & Haas, 2002). Security Issues in MANET Protecting wireless ad hoc networks has newly achieved a power and turned out to be a major issue in endeavor to offer protected communication in an impervious wireless ad-hoc situation. However, many plans were stated without getting a wide-ranging result. Protecting a wireless ad hoc network is mainly hard for a lot of causes such as (Jangra, Goel, Priyanka, & Bhatia, 2010), (Rashmi, 2008), (Kaced & Moissinace, 2007) and (Yang, Luo, Ye, Lu, & Zhang, 2004): Exposure of Channels: Communication message can be snooped and false messages could be inserted into the network, even without need of physical entry. Exposure of Nodes: Network communication nodes can be simply pilfered or detained as well as are able to collapse under the power of the network intruders. Deficiency of Infrastructure: Ad hoc communication networks work independently without involving some infrastructure, which makes unsuitable some traditional solutions foundational upon certification establishment as well as online servers. Dynamically Varying Topology: Refined routing protocols intended to pursue the enduring transformations in physical layout of network can be hit through wrong routing data and information produced by negotiated terminals, that is hard to differentiate. Open Medium: MANET is extensively open to the outer attacks like eavesdropping that is extra simpler as compared to wired network. Dynamically Altering Network Topology: MANET contains mobile nodes those arrive and exit from the network, thus permitting some nasty node to create a link with the network exclusive of being noticed. Cooperative Algorithms: The network communication routing algorithm of Mobile ad-hoc networks needs joint conviction among nodes that breaks the standards of Network Security. Lack of Centralized Monitoring: The lack of some centralized communication infrastructure forbids some monitoring instrument in the overall network system. Lack of Clear Line of Defense: The simple utilization of 1 line of security or defense network attack avoidance can not protect. In this scenario, the practice of security assessment in wired based communication world has outlined that we require installing layered security methods for the reason that security is a procedure that is as protected as its fragile connection. As well to evasion, we require 2-line of network communication defense, discovery and reaction. Security Solutions for MANET Attaining secure performances in communication of the wireless ad-hoc atmosphere is a demanding job. As compared to wired networks the exclusive uniqueness of ad-hoc networks cause a numerous significant issues to security framework, like that broad peer-to-peer structure, less protected operational atmosphere as well as divided transmitted radio control, rambling of transmission nodes, rigorous resource limitations, extremely active network physical layout or topology combined with shortage of fundamental influence as well as connection, physical consistency, extendibility and weakness. In case of MANET, in the pervious section I have outlined a number of aspects and issues regarding the possible weaknesses at such network that possibly make the mobile ad hoc networks less secure. This section will present some security solutions to the mobile ad-hoc network. In this connection, I have outlined below some solutions those can be used for enhanced security and protection of the MANET: (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009): Security Principles for MANET Sooner than we appraise the solutions that are able to facilitate the safe mobile ad-hoc network, it is essential to discover that how we are able to evaluate if a mobile ad-hoc network is protected or not, or what must be enclosed in the security standards or principles intended for the mobile ad-hoc network as we desired to examine the security condition of the mobile ad-hoc network. Below I have presented the extensively employed principles to evaluate if the mobile ad hoc network is considerable secure or else not (Li & Joshi, 2009). Availability Availability outlines that a communicating node should uphold its capability to offer the entire designed services in spite of the security condition of it. This safety rule is confronted mostly in the course of the DOS or denial-of-service attacks, in that the entire of the communication nodes in the network are able to be the attacked target as well as therefore a number of egotistic communication nodes make a number of the network services busy in some way, like that creating problems to the routing protocols or the network key management service (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Integrity In case of network arrangement integrity assures the uniqueness of the messages as soon as they are broadcasted. However, the integrity can be composed of mostly in 2 manners. One is accidental modification and other is malicious modification. In this scenario, a network data message is able to be repeated, detached or changed through an enemy or intruder by means of wicked objectives, that is regarded as malicious modifications; on the unusual, if the message is mislaid or its data part is altered from a number of gentle malfunction, that can broadcast some sort of mistakes in the data as well as information communication or hardware faults like that hard disk breakdown, subsequently it is classified as accidental modification (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Confidentiality Confidentiality outlines some of the information that is simply available to those persons who have been certified to get admittance to it. Stating in another way, in order to uphold the confidentiality of a number of sensitive information, we require maintaining their clandestine from the entire units that do not encompass the right to get access to them (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Authenticity Network communication authenticity is fundamentally the declaration that members participating in communication are authentic as well as not imitators. However, it is essential for the network communication members to establish their uniqueness as what they have argued by means of numerous techniques in an attempt to make sure the legitimacy. On the other hand, if there is no similarity in an authentication system, the opposition could imitate a caring communication node and therefore gain right of entry to the secret services and resources, or even broadcast a number of phony messages to upset the standard network procedures or to degrade the network performance (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Nonrepudiation Non-repudiation makes sure that the data transmitter as well as the receiver of a message is not able to refute that they have yet transmitted or acknowledged such a message. Thus, this becomes a particular issue when we require distinguishing if a node by means of a number of irregular actions is negotiated or not: if a network communication node identifies that the message it has expected is faulty, it is able to be afterward utilized the wrong message as a proof to inform other nodes that the node transmitting the offensive message should have been negotiated (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Authorization Authorization is a procedure through which an individual is assigned a credential that states the authorizations and rights that it has as well as is distinguished to be deceptive, through the certificate authority. In addition, the authorization is normally employed to assign diverse access privileges to diverse range of computer users. For example, we require ascertaining that network management tasks are simply offered through the network administrator. Consequently there should be a permission procedure previous to the network administrator gets access to the network supervision tasks (Jangra, Goel, Priyanka, & Bhatia, 2010) and (Li & Joshi, 2009). Anonymity Anonymity outlines that all the data and information that could be employed to recognize the owner or the present user of the node should evade or be set aside confidential as well as are not spread through the node itself or the system software execution. This principle is intimately connected to the privacy protecting in that we should attempt to care for the security of the nodes from random disclosure to some other individuals (Jangra, Goel, Priyanka, & Bhatia, 2010), (Yi, Zhong, & Zhang, 2007), (Yu, Zhang, Song, & Chen, 2005) and (Li & Joshi, 2009). Security Management Methods for MANET In the pervious section of this paper I have outlined some of the main aspects and areas regarding the security issues along with fundamental security and privacy defense aspects those we need to corroborate. In this section I will present some of the main security systems and methods to competently tackle the attacks on the MANET. Below I have outlined some of the main security and privacy preservation aspects: Intrusion Detection Techniques Intrusion detection is not a latest initiative in the network security design and protection paradigm. In this scenario, an intrusion detection system (IDS) examines network traffic and looks for doubtful action and informs the network or system administrator. However, in a lot of situations the IDS may also act in response to uncharacteristic or malevolent traffic through actions for instance not allowing the user by blocking source IP address from using the network. Though there are a number of dissimilarities among the conventional wired network and the mobile ad-hoc network, IDS technique, that is designed initially in the wired network and it has turned out to be a extremely significant in the security solution intended for the wired network, has as well achieved a number of considerations from the researchers when they look into the security solution intended for the mobile ad-hoc network (Li & Joshi, 2009) and (Bradley, 2011). IDS Techniques in MANET (Zhang & Lee, 2000) and (Li & Joshi, 2009) presented a detailed analysis of the broad intrusion detection structure in MANET that was distributed as well as cooperative to convene by the requirements of MANET. I have presented the proposed architecture of the IDS in figures given below: Figure 1- IDS for MANET (Li & Joshi, 2009) Source http://www.cs.umbc.edu/~wenjia1/699_report.pdf In this arrangement, each network communication node in the mobile ad hoc networks contributes in the ID as well as replies the behavior by sensing notices of intrusion actions locally as well as discretely; those are carried through the incorporated intrusion detection system instrument. Though, the adjoining communication nodes are able to distribute their assessment outcomes with each other as well as collaborate in a wider series. However, the collaboration among nodes normally occurs when a definite node notices an irregularity but does not provide sufficient evidence to comprehend what category of intrusion or infringement it belongs to. In this state, the node that has perceived the irregularity necessitates other nodes in the communication range to carry out searches to their protection records in an attempt to track the probable paths of the intruder (Li & Joshi, 2009). Cluster Based IDS As discussed above the supportive intrusion detection architecture for the ad-hoc networks, all the communication nodes in this structure are presumed to contribute in the supportive intrusion detection actions when there is such a need, which can create various problems for the network for instance, enormous power utilization for the entire communication nodes. Because of the imperfect power availability in the ad-hoc network, this structure can create a number of communication nodes to act in an egotistic manner and not supportive with other network arrangement nodes consequently in respect of accumulating their power of battery, that will in fact contravene the valid purpose of this supportive IDS structure. To determine this difficulty, Huang et al. outlined a cluster-based IDS method intended for ad hoc networks (Huang & Lee, 2003) and (Li & Joshi, 2009). MANET can be planned into a number of clusters in such a manner that each node is an associate of at least one communication network clusters, as well as there will be simply single node for every cluster that will ensure the monitoring problems in a definite phase of time, that is normally known as cluster-head. As it is expressed, a cluster is a collection of network communication nodes that remain inside the similar radio assortment by means of each other that outlines that as a network communication node is preferred as the cluster-head, the entire of the additional nodes in this network communication cluster should be inside 1-hop zone. In this scenario, it is essential to make sure the equality as well as competence of the cluster assortment procedures. Here equality holds two stages of importance, the likelihood of each node in the group to be chosen as the cluster-head must be equivalent, and every node has to carry out as the cluster network node for the similar amount of period. However, the competence of the procedure outlines that there should be a number of techniques those are able to choose a node from the cluster occasionally by means of elevated competence (Li & Joshi, 2009). Misbehavior Detection (Parker, Undercoffer, Pinkston, & Joshi, 2004) presented the cross-layer analysis technique. In scenario of this method it is assessed that how an attack carried out in the MANET as well as it discovered that a number of tidy attackers can all at once use numerous exposures at diverse layers however to maintain attack of every weaknesses persist below the discovery porch consequently with regard to getaway from detaining through the single-layer misbehavior detector. On the other hand, this kind of cross-layer assault will be far more intimidating as compared to single-layer attack in that it is able to be simply omitted through the single-layer misbehavior detector. Yet, this attack situation is able to be noticed through a cross-layer misbehavior detector, in that the information as well as data contributions as of the entire layers of the network load are distributed plus evaluated through the cross-layer detector in a wide-ranging process. This method has as well incorporated the challenge through functioning by RTS/CTS input from the 802.11 MAC layer united with network layer discovery of crashed packets of data (Li & Joshi, 2009), (Parker, Undercoffer, Pinkston, & Joshi, 2004) and (Huang & Lee, 2003). There are numerous features that would be further discovered in this section. Initially, it will be a significant problem that how to formulate the cross-layer discovery more well-organized, or in other words, how to collaborate among single-layer sensors to prepare them carry out operations effectively. Because diverse single-layer detectors tackle with diverse kinds of attacks, there can be a number of diverse observations to the similar attacking situation when it is experienced in diverse layers. Hence it is essential to determine the probable way out if there is diverse detection outcomes produced through dissimilar layers. After that, we require discovering how a great deal the system resource as well as network operating cost will be augmented because of utilization of cross-layer detector, as evaluated by the actual single-layer detector. Because of the imperfect battery power of the network communication nodes in the ad-hoc networks, the network and system operating cost carried through the cross-layer discovery that should be taken into account as well as contrasted by means of the performance increase caused through the utilization of cross-layer detection technique (Li & Joshi, 2009) and (Parker, Undercoffer, Pinkston, & Joshi, 2004). Secure Routing Method There are different types of network security attacks beside the routing layer in the mobile ad-hoc networks, a number of those are more difficult as well as tough to detect as compared to others, like that rush attacks and wormhole attacks (Marti, Giuli, Lai, & Baker, 2000) and (Li & Joshi, 2009). Now I will present the security and privacy technique we will use against rush attacks and wormhole attacks in MANET. Defense Method against Wormhole Attacks in Mobile Ad Hoc Networks Wormhole attack is an aggressive network security attack over routing protocols intended for the mobile ad-hoc networks. In this type of attack, a hacker reports network transferred data packets through sitting at one place in the network, burrows those networks transferred packets to some other locality, as well as reruns them into the communicating network. The reaction of the information will formulate enormous uncertainty to the routing problems in mobile ad hoc network for the reason that the network nodes that obtain the replayed data packets are not able to be differentiated as of the real routing packets. Furthermore, for excavated gaps larger than the typical wireless transmission variety of a particular hop, it is easy intended for the network security attacker to formulate the burrowed packet appear through improved metric than a regular multi-hop path, that makes the network security attack casualty node more probable to acknowledge the burrowed packets in its place actual routing network packets. As an effect, the routing operations in the mobile ad hoc network will be extremely delayed through the wormhole attack. For instance, the majority of obtainable ad-hoc network routing protocols, devoid of a number of ways to protect beside the wormhole attack, would not be capable to discover routes bigger than one or two network communication hops, thus extensively distracting network communication (Li & Joshi, 2009), (Hu, Perrig, & Johnson, 2006) and (Li & Joshi, 2009). Conclusion This paper has presented a comprehensive analysis of some of the prime areas and aspects of the Mobile ad hoc networks. This paper has shown that mobile ad hoc networks have the capability to establish networks on the air in possible harsh situations where is not possible to set-up a customary network arrangements. Thus, the significance of MANET cannot be denied as the world of computing is going to become compact as well as portable. However, as compared to the wired networks, MANET represents a number of confronts to the security results because of their wireless common medium, haphazard topology, strict resource restrictions and mixed resources etc. On the other hand, the research on the MANET technology and security is so far in its initial phases. Thus, there is a huge need for more explorations along with advancements. This paper has outlined the security needs for the MANET communication network. This paper has also outlined some important aspects regarding the security defense with possible IDS based security management at the MANET arrangement. References Bakht, H. (2011). WIRELESS INFRASTRUCTURE: Understanding mobile ad-hoc networks. Retrieved February 07, 2011, from ComputingUnplugged.com: http://www.computingunplugged.com/issues/issue200406/00001301001.html Bradley, T. (2011). Introduction to Intrusion Detection Systems (IDS). Retrieved February 09, 2011, from About.com: http://netsecurity.about.com/cs/hackertools/a/aa030504.htm Hu, Y., Perrig, A., & Johnson, D. (2006). Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2, pp. 1-11. Huang, Y.-a., & Lee, W. (2003). A cooperative intrusion detection system for ad hoc networks. SASN '03 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135-147). New York: ACM. Jangra, A., Goel, N., Priyanka, & Bhatia, K. (2010). Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture. International Journal of Electronics Engineering Volume 2, Issue 1, pp. 189-196. Kaced, A. R., & Moissinace, J.-C. (2007). Secure Intermediatry Caching in Mobile Wireless Using Asymmetric Cipher Sequences Based Encryprion . In H. Zhang, S. Olariu, J. Cao, & D. B. Johnson, Mobile Ad-hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings (Lecture Notes in ... Networks and Telecommunications) (p. 735). Springer. Li, W., & Joshi, A. (2009). Security Issues in Mobile Ad Hoc Networks: A Survey. Retrieved February 11, 2011, from http://www.cs.umbc.edu/~wenjia1/699_report.pdf Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265). New York: ACM. Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Papadimitratos, P., & Haas, Z. J. (2002). Secure Routing for Mobile Ad hoc Networks. In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), (pp. 27-31). San Antonio, TX. Parker, J., Undercoffer, J., Pinkston, J., & Joshi, A. (2004). On intrusion detection and response for mobile ad hoc networks. Performance, Computing, and Communications, 2004 IEEE International Conference (pp. 747-752). IEEE. Rashmi. (2008, August 11). MANET (Mobile Adhoc NETwork). Retrieved February 09, 2011, from Saching.com: http://www.saching.com/Article/MANET---Mobile-Adhoc-NETwork--/334 The National Institute of Standards and Technology . (2008, June 04). Mobile Ad Hoc Networks (MANETs) . Retrieved February 13, 2011, from http://www.antd.nist.gov/wahn_mahn.shtml Yang, H., Luo, H., Ye, F., lLu, S., & Zhang, L. (2004, February). Security in Mobile Ad hoc Networks: Challenges and Solutions . Retrieved February 13, 2011, from IBM.com: http://domino.research.ibm.com/comm/research_people.nsf/pages/yefan.pubs.html/$FILE/security-chapter04.pdf Yi, P., Zhong, Y., & Zhang, S. (2007). An immunity-based security architecture for mobile ad hoc networks . Journal of Electronics Volume 23, Issue 3, pp. 417-422. Yu, S., Zhang, Y., Song, C., & Chen, K. (2005). A security architecture for Mobile Ad Hoc Networks. Retrieved February 12, 2011, from http://www.cn.apan.net/cairns/NRW/43-Yu%20Shuyao.pdf Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275-285). ACM. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Solutions for MANETs (mobile ad-hoc networks) including the Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1407588-security-solutions-for-manets-mobile-ad-hoc-networks-including-the-development-of-ids
(Security Solutions for MANETs (mobile Ad-Hoc Networks) Including the Research Paper)
https://studentshare.org/information-technology/1407588-security-solutions-for-manets-mobile-ad-hoc-networks-including-the-development-of-ids.
“Security Solutions for MANETs (mobile Ad-Hoc Networks) Including the Research Paper”, n.d. https://studentshare.org/information-technology/1407588-security-solutions-for-manets-mobile-ad-hoc-networks-including-the-development-of-ids.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS

Mobile Computing and Wireless Communication

In such cases the intercommunicating ability of mobile ad-hoc networks within short range proves to be very useful.... Sensor networks: One typical application for mobile communication is the sensor network, used for gathering information about the surroundings of the mobile equipment.... Mobile networks got further enhancement with the help of wireless communication and sophisticated sensors.... Sensor networks, in particular require to support a large number of 'subscribers', resulting in an increase in density per cell....
9 Pages (2250 words) Essay

Mobile Computing and Mobile Computing Security

One of the advantages of using a WLAN is the flexibility it offers to overcome restrictions of physically connected networks to space restrictions.... atellite networks use communications satellites acting as central points for transferring data.... he advent of mobile phones or cellular phones ushered in the creation of cellular networks.... The report "mobile Computing and mobile Computing Security" discusses the advantages of mobile computing technologies and features of mobile computing security....
6 Pages (1500 words) Report

Mobile Ad Hoc Wireless Network

ehicular ad-hoc networks (VANETs): Communications between vehicles, vehicles nodes can move with high speed and still communicate quickly and reliably.... There's lot more to describe Objective and Scope: While mobile ad-hoc Networking (MANET) research has received a considerable attention in recent years but it is yet to become a trendy technology.... There's lot more to describeObjective and Scope: While mobile ad-hoc Networking (MANET) research has received a considerable attention in recent years but it is yet to become a trendy technology....
2 Pages (500 words) Admission/Application Essay

Mobile Computing and Inter-Vehicle Communication

IVC enables every high-speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks (MANETS).... (Chen 2001) Traditional routing protocols used on the mobile ad-hoc networks (MANET) can be divided into two major categories: the single path and the multipath routing.... It starts with explaining the types of vehicle-to-vehicle ad-hoc networks and their peculiarities, and then it gives an outline of the present and future applications....
10 Pages (2500 words) Essay

Wireless Network Security

This report talks about mobile Ad Hoc Network which refers to a type of mobile network in which each node has the ability to act as a router”.... The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET.... However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security....
7 Pages (1750 words) Essay

Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS

The paper "Security Solutions for mobile ad-hoc networks including the development of ids" states that mobile ad hoc networks have the capability to establish networks on the air in possible harsh situations where is not possible to set-up customary network arrangements.... This paper presents a comprehensive analysis of mobile ad hoc security issues and offers security solutions for MANETs (mobile ad-hoc networks) including the development of ids (Intrusion Detections System)....
15 Pages (3750 words) Research Paper

The Development of Vehicular and Mobile Network

The paper 'the development of Vehicular and Mobile Network' focuses on a dynamic professional with a Ph.... research focused on the development of vehicular & mobile ad hoc networks, as well as artificial intelligence and real-time communications systems.... It was a challenging task to switch to a new exciting field of mobile networks.... I was fortunate to join a team of experienced researchers at UTM where I liaise extensively with other team members to create solutions to complex research problems....
17 Pages (4250 words) Personal Statement

Security in Wireless Network

The system of network security relies on the protection layers and comprises numerous constituents including security software and networking besides appliances and hardware.... Network security shields various computer networks in both the private and public domain that are utilized in the day to day jobs for carrying out transactions as well as ensure communications among government agencies, businesses, as well as individuals (Kent, Dicoi, & National Institute of Standards and Technology (U....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us