Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe
system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed
%0 Journal Article
%1 noauthororeditor
%A Ashish kumar khare1, Dr. R. C. Jain2
%A Rana3, Dr. J. L.
%D 2015
%J Informatics Engineering, an International Journal (IEIJ)
%K Attacks, MANETs, Security, Trust, Wireless network.
%N 03
%P 01-10
%R DOI : 10.5121/ieij.2015.3301
%T A REVIEW: TRUST, ATTACKS AND SECURITY
CHALLENGES IN MANET
%U http://airccse.org/journal/ieij/papers/3315ieij01.pdf
%V 03
%X Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe
system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed
@article{noauthororeditor,
abstract = {Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe
system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed},
added-at = {2018-09-21T08:24:32.000+0200},
author = {Ashish kumar khare1, Dr. R. C. Jain2 and Rana3, Dr. J. L.},
biburl = {https://www.bibsonomy.org/bibtex/2d81774369d043189a0e6d5285f3dc3c9/ieij1},
doi = {DOI : 10.5121/ieij.2015.3301},
interhash = {71dfa8439b071bf937d57a29f50778b1},
intrahash = {d81774369d043189a0e6d5285f3dc3c9},
issn = {ISSN : 2349 - 2198},
journal = {Informatics Engineering, an International Journal (IEIJ)},
keywords = {Attacks, MANETs, Security, Trust, Wireless network.},
language = {english},
month = sep,
number = 03,
pages = {01-10},
timestamp = {2018-09-21T08:24:32.000+0200},
title = {A REVIEW: TRUST, ATTACKS AND SECURITY
CHALLENGES IN MANET},
url = {http://airccse.org/journal/ieij/papers/3315ieij01.pdf},
volume = 03,
year = 2015
}