{"title":"移动Ad-Hoc网络安全中的漏洞、挑战和威胁","authors":"N. Raj, P. Bharti, Sanjeev Thakur","doi":"10.1109/CSNT.2015.101","DOIUrl":null,"url":null,"abstract":"Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major area of research. This paper is concluded by a comprehensive summary which discussed the vulnerabilities, challenges and security attacks on ad-hoc routing protocols which leads to difficulties in designing and development of a secure routing protocol and is challenging task for researcher in an open and distributed communication environments.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network\",\"authors\":\"N. Raj, P. Bharti, Sanjeev Thakur\",\"doi\":\"10.1109/CSNT.2015.101\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major area of research. This paper is concluded by a comprehensive summary which discussed the vulnerabilities, challenges and security attacks on ad-hoc routing protocols which leads to difficulties in designing and development of a secure routing protocol and is challenging task for researcher in an open and distributed communication environments.\",\"PeriodicalId\":334733,\"journal\":{\"name\":\"2015 Fifth International Conference on Communication Systems and Network Technologies\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on Communication Systems and Network Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT.2015.101\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2015.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network
Mobile ad-hoc network (MANET) is the collection of various mobile nodes which are connected together over a wireless medium having no fixed infrastructure. Each participating node in the network acts as both router and host and responsible for forwarding packets for other nodes. Nowadays MANETs are becoming famous for their applications and features. In MANET identifying the security issues is major area of research. This paper is concluded by a comprehensive summary which discussed the vulnerabilities, challenges and security attacks on ad-hoc routing protocols which leads to difficulties in designing and development of a secure routing protocol and is challenging task for researcher in an open and distributed communication environments.