{"title":"manet中的安全协议","authors":"S. Kumar, G. Pruthi, A. Yadav, M. Singla","doi":"10.1109/ACCT.2012.101","DOIUrl":null,"url":null,"abstract":"Mobile ad-hoc network (MANET) is one of the recent active fields and has received marvelous attention. MANET is a collection of mobile nodes having the capability of forming temporarily network without the aid of any established infrastructure or centralized administration. Due to the self-configuration and self maintenance capabilities, MANETs become more vulnerable. So, Security challenges have become a primary concern to provide secure communication between mobile nodes. Many techniques have been developed to identify different type of network attacks. In this paper, we study the major attack types that MANET faces and the security goals to be achieved. This paper gives out a brief survey of major security protocols with their relative comparison.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Security Protocols in MANETs\",\"authors\":\"S. Kumar, G. Pruthi, A. Yadav, M. Singla\",\"doi\":\"10.1109/ACCT.2012.101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile ad-hoc network (MANET) is one of the recent active fields and has received marvelous attention. MANET is a collection of mobile nodes having the capability of forming temporarily network without the aid of any established infrastructure or centralized administration. Due to the self-configuration and self maintenance capabilities, MANETs become more vulnerable. So, Security challenges have become a primary concern to provide secure communication between mobile nodes. Many techniques have been developed to identify different type of network attacks. In this paper, we study the major attack types that MANET faces and the security goals to be achieved. This paper gives out a brief survey of major security protocols with their relative comparison.\",\"PeriodicalId\":396313,\"journal\":{\"name\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-01-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Second International Conference on Advanced Computing & Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACCT.2012.101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2012.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mobile ad-hoc network (MANET) is one of the recent active fields and has received marvelous attention. MANET is a collection of mobile nodes having the capability of forming temporarily network without the aid of any established infrastructure or centralized administration. Due to the self-configuration and self maintenance capabilities, MANETs become more vulnerable. So, Security challenges have become a primary concern to provide secure communication between mobile nodes. Many techniques have been developed to identify different type of network attacks. In this paper, we study the major attack types that MANET faces and the security goals to be achieved. This paper gives out a brief survey of major security protocols with their relative comparison.