Open Access Open Access  Restricted Access Subscription or Fee Access

Challenges in Mobile Ad-hoc Networks

Anandhi Giri

Abstract


In the recent years, mobile networking via smart phones and mobile telephones is broadly recognized as an infrastructure based networking. Many mobile devices support a variety of communication interfaces that are suitable for ad-hoc communication. For example, WIFI and Bluetooth can be used for ad-hoc networking. One key reason, why are these networking devices hardly used in ad-hoc mode by mobile applications, is that limitations in the reliability of network access. Despite all technical issues the consideration of social aspects and commercial aspects is a major point for any success of MANET technology for mobile applications. Mobile Adhoc networks are such type of networks which does not have any centralized authentication and the nodes communicate with each other. MANET is a kind of Ad Hoc network with mobile, wireless nodes. Due to its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self-configuration and self-maintenance capabilities. In MANET security plays a vital role for safe communication. The focus is given on security of Mobile Adhoc Networks. MANET is open network which is available for the malicious and trustworthy users to communicate. The MANET has to design a robust solution which deals with such type of malicious attackers so that a health network transmission takes place between trustworthy nodes. The Mobile Adhoc Networks are the network which works in separation along with the wired infrastructure. This elasticity of MANET is its biggest strength but it is also a big vulnerability for security issues. In the current paper, we will discuss the active and passive attacks including black hole attacks, spoofing, warm hole, flooding and traffic monitoring, traffic analysis and eavesdropping respectively. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. We argue a message centric approach to ad-hoc networking, which trusts on simple store and forward mechanism to spread data asynchronously in the network. We will also discuss the active and passive attacks including black hole attacks, spoofing, warm hole, flooding and traffic monitoring, traffic analysis and eavesdropping respectively.

Full Text:

PDF

References


ComScore, Study on social networking access via mobile browser, Reston, VA (2010).

Lugano, G., Mobile social networking in theory and practice, First Monday, Volume 13, Number 11 (2008).

Mokhtar, S., Licia Capra, L., A Middleware Service for Pervasive Social Networking, Proceedings of the international Workshop on Middleware For Pervasive Mobile and Embedded Computing, USA (2009).

Mokhtar, S., Licia Capra, L., From pervasive to social computing: algorithms and deployments, Proceedings of the International Conference on Pervasive Services, London, UK (2009).

Beckman, P., S. Verma, J. Mindel, Innovating with Technology: The Impact of Overload, Autonomy, and Work and Family Conflict, Journal of Information Technology Theory and Application (JITTA), 9:4 (2009) 67-81.

.6. Hoffmann, H; Leimeister, Jan Marco; and Krcmar, Helmut, A Framework for Developing Personalizeable Mobile Services in Automobiles. Proceedings of the ECIS 2007. Paper 187.

Bitkom, Mobile Life 2012, http://www.bitkom.org/de/presse/56204_54145.aspx (2008).

. A.Gantes and j. stucky, "A platform on a Mobile Ad hoc Network challenging collaborative gaming," international symposium on collaborative technologies and systems, 2008.

K.U. R. Khan, R. U. Zaman, and A. V. G. Reddy, "Integrating Mobile Ad Hoc Networks and the

Internet challenges and a review of strategies," presented at the 3rd International Conference on

Communication Systems Software and Middleware and Workshops, COMSWARE, 2008.

M.Suguna and P. Subathra, " Establishment of stable certificate chains for authentication in mobile ad hoc networks," presented at the International Conference on Recent Trends in Information

Technology (ICRTIT), 2011.

H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012.

F.D. Rango, M. Fotino, and S. Marano, "EE-OLSR: Energy Efficient OLSR routing protocol for

Mobile ad-hoc Networks," presented at the Military Communications Conference, MILCOM, 2008.

S. K. Sarkar, T. G. Basavaraju, C. Puttamadappa,“Adhoc mobile wireless networks: principles, protocols, and applications,” Auerbach Publications, (2008)

.




DOI: https://doi.org/10.37628/ijowns.v3i2.287

Refbacks

  • There are currently no refbacks.