{"title":"Security challenges in reactive Mobile Ad Hoc Network","authors":"Chinmay Ghosh, D. Jana, B. B. Bhaumik","doi":"10.1109/INDCON.2011.6139352","DOIUrl":null,"url":null,"abstract":"Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges due to changeable topology, wireless shared medium, diverse resources and inflexible resource constraints etc. In this paper, we present an elaborate view of issues of MANET with emphasis on security challenges in reactive protocol with different dimensions like secure routing, secured key management and trust management through reputation in order to detect intrusion and protect.","PeriodicalId":425080,"journal":{"name":"2011 Annual IEEE India Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Annual IEEE India Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCON.2011.6139352","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges due to changeable topology, wireless shared medium, diverse resources and inflexible resource constraints etc. In this paper, we present an elaborate view of issues of MANET with emphasis on security challenges in reactive protocol with different dimensions like secure routing, secured key management and trust management through reputation in order to detect intrusion and protect.