首页    期刊浏览 2024年10月06日 星期日
登录注册

文章基本信息

  • 标题:A COMPREHENSIVE STUDY OF LATEST SECURITY MODELS FOR MANETS : COVERING INTRUSION DETECTION AND DENIAL OF SERVICE ATTACKS
  • 本地全文:下载
  • 作者:Deepak Verma ; Renu Jain ; Ashwani Kush
  • 期刊名称:International Journal of Computing and Business Research
  • 电子版ISSN:2229-6166
  • 出版年度:2013
  • 卷号:4
  • 期号:1
  • 出版社:International Journal of Computing and Business Research
  • 摘要:Mobile Ad Hoc Networks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET’s are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a moment hence there is a need to have a security system which could take into consideration many possibilities at the same time. The problem of intrusion detection and denial of service attack have been discussed in this paper. The objective of the paper is to present the recent work that is being done for intrusion detection and denial of service attack and also to emphasize on the fact that there is a need of work to be done to provide a comprehensive solution for intrusion detection and denial of service attack prevention, which are the two most prominent vulnerabilities of MANETs. 1.0 Introduction Mobile Ad hoc Networks are Nodes (generally Hand held devices) which communicate with each other in the limited area forming a network for the purpose of sharing information. The network is short lived and does not require any wired links. Such a network generally does not have any central authority to authenticate the nodes or to manage the routing. Every node has the responsibility of routing as well. Due to its distributed nature in terms of authentication and open air access the security aspects in terms of confidentiality, authentication, integrity, availability, access control and non repudiation become more important. The usefulness of MANET’s is due to its ease of deployment which leads to the only possibility in case of disaster management, military operations and situations where there is urgent and short lived need of a network.
国家哲学社会科学文献中心版权所有