{"title":"响应式移动Ad Hoc网络中的安全挑战","authors":"Chinmay Ghosh, D. Jana, B. B. Bhaumik","doi":"10.1109/INDCON.2011.6139352","DOIUrl":null,"url":null,"abstract":"Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges due to changeable topology, wireless shared medium, diverse resources and inflexible resource constraints etc. In this paper, we present an elaborate view of issues of MANET with emphasis on security challenges in reactive protocol with different dimensions like secure routing, secured key management and trust management through reputation in order to detect intrusion and protect.","PeriodicalId":425080,"journal":{"name":"2011 Annual IEEE India Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security challenges in reactive Mobile Ad Hoc Network\",\"authors\":\"Chinmay Ghosh, D. Jana, B. B. Bhaumik\",\"doi\":\"10.1109/INDCON.2011.6139352\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges due to changeable topology, wireless shared medium, diverse resources and inflexible resource constraints etc. In this paper, we present an elaborate view of issues of MANET with emphasis on security challenges in reactive protocol with different dimensions like secure routing, secured key management and trust management through reputation in order to detect intrusion and protect.\",\"PeriodicalId\":425080,\"journal\":{\"name\":\"2011 Annual IEEE India Conference\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Annual IEEE India Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDCON.2011.6139352\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Annual IEEE India Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDCON.2011.6139352","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security challenges in reactive Mobile Ad Hoc Network
Mobile Ad Hoc Network (MANET) has become significantly important to support self-organizing roaming computing with changing links to neighboring hosts. The topology is changed so rapidly, finding a routing path is a challenge in reactive protocol methodology. Securing ad hoc networks is infamously challenging, notably due to the lack of an online infrastructure. MANET poses a number of security challenges due to changeable topology, wireless shared medium, diverse resources and inflexible resource constraints etc. In this paper, we present an elaborate view of issues of MANET with emphasis on security challenges in reactive protocol with different dimensions like secure routing, secured key management and trust management through reputation in order to detect intrusion and protect.