Reference Hub10
Securing Mobile Ad Hoc Networks: Challenges and Solutions

Securing Mobile Ad Hoc Networks: Challenges and Solutions

Sunil Kumar, Kamlesh Dutta
Copyright: © 2016 |Volume: 7 |Issue: 1 |Pages: 51
ISSN: 1947-9158|EISSN: 1947-9166|EISBN13: 9781466691445|DOI: 10.4018/IJHCR.2016010103
Cite Article Cite Article

MLA

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks: Challenges and Solutions." IJHCR vol.7, no.1 2016: pp.26-76. http://doi.org/10.4018/IJHCR.2016010103

APA

Kumar, S. & Dutta, K. (2016). Securing Mobile Ad Hoc Networks: Challenges and Solutions. International Journal of Handheld Computing Research (IJHCR), 7(1), 26-76. http://doi.org/10.4018/IJHCR.2016010103

Chicago

Kumar, Sunil, and Kamlesh Dutta. "Securing Mobile Ad Hoc Networks: Challenges and Solutions," International Journal of Handheld Computing Research (IJHCR) 7, no.1: 26-76. http://doi.org/10.4018/IJHCR.2016010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are highly susceptible to various security threats due to their inherent characteristics that can adversely affect their performance. In order to provide secure communication in mobile ad hoc networks, it is required to understand various possible attacks at different layers of the communication protocol stack. The intent of this paper is to provide structured and comprehensive study of prominent security attacks reported in the literature for mobile ad hoc networks. In addition, we also discuss various well-known reactive and proactive security solutions proposed in literature to prevent those attacks in MANETs. Finally, the paper is concluded with a brief discussion on future direction of research in MANETs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.