CFP last date
20 May 2024
Reseach Article

A Basic Technology of Cooperation in Mobile Ad Hoc Networks

Published on None 2011 by Raju Barskar, Rajesh Wadhvani
International Symposium on Devices MEMS, Intelligent Systems & Communication
Foundation of Computer Science USA
ISDMISC - Number 7
None 2011
Authors: Raju Barskar, Rajesh Wadhvani
c0b619b2-fb84-43c5-aecc-1ed3a4c31cbe

Raju Barskar, Rajesh Wadhvani . A Basic Technology of Cooperation in Mobile Ad Hoc Networks. International Symposium on Devices MEMS, Intelligent Systems & Communication. ISDMISC, 7 (None 2011), 1-4.

@article{
author = { Raju Barskar, Rajesh Wadhvani },
title = { A Basic Technology of Cooperation in Mobile Ad Hoc Networks },
journal = { International Symposium on Devices MEMS, Intelligent Systems & Communication },
issue_date = { None 2011 },
volume = { ISDMISC },
number = { 7 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/isdmisc/number7/3485-isdm145/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Symposium on Devices MEMS, Intelligent Systems & Communication
%A Raju Barskar
%A Rajesh Wadhvani
%T A Basic Technology of Cooperation in Mobile Ad Hoc Networks
%J International Symposium on Devices MEMS, Intelligent Systems & Communication
%@ 0975-8887
%V ISDMISC
%N 7
%P 1-4
%D 2011
%I International Journal of Computer Applications
Abstract

‘Mobile Ad hoc Networks’ (MANETs) properties present major vulnerabilities in security. Wireless ad hoc technology is demanding and continually growing. Its dynamics and flexibility allow the network to be easily set up without the requirement of a predetermined infrastructure. The advancement of the technology itself draws attentions from intruders as well as researchers and developers. In a multi-hop hop mobile ad hoc network (MANET), mobile belonging to the first category are either faulty and therefore nodes cooperate with each other without using any cannot follow a protocol, or are intentionally malicious and infrastructure such as access points or base stations. They try to attack the system. The problems created by these nodes nodes' mobility and fundamentally limited capacity of the need to be addressed at many layers, for example, using wireless medium, together with wireless transmission effects spread-spectrum encoding to avoid interference over the such as attenuation, multi-path propagation, and interference communication channel, using a reputation system to identify combine to pose significant challenges for security in the malicious system, and subsequently avoid or penalize MANETs. This kind of selfishness needs a comprehensive mechanism to cope with and we have planned to publish such mechanism in early future.

References
  1. Ram Ramanathan and Jason Redi, “A brief overview of Ad-hoc Networks: Challenges and Directions”, IEEE Communications Magazine May 2002, pp. 20-22.
  2. E.M.Belding-Royer and C.K.Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, pages 46-55, April 1999.
  3. Yongwei Wang, Venkata C. Giruka, Mukesh Singhal, A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks, Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, ADHOC-NOW 2004, Vancouver, Canada, July 22-24, 2004. Proceedings Pages 211-224.
  4. Sheng Zhong, Jiang Chen, and Yang Richard Yang, Sprite: A simple, Cheatproof,Credit-based System for Mobile Ad hoc Networks, in Proceedings of IEEE Infocom '03, San Francisco, CA, April 2003.
  5. Pietro Michiardi, Re_k Molva, Game theoretic analysis of security in mobile ad hoc networks, Research Report RR-02-070, April 2002.
  6. Dave B. Johnson and David A. Maltz., “The dynamic source routing protocol for mobile ad hoc networks”. Inter- net Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 1999.
  7. L. Zhou and Z. Haas, “Securing ad hoc networks”. IEEE Network, 13(6):pp-24--30, November/December 1999.
  8. P. Michiardi, R. Molva. “Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks”. European Wireless Conference, 2002.
  9. S. Buchegger and J.-Y. L. Boudec, “Nodes bearing grudges: owards routing security, fairness, and robustness in mobile ad hoc networks,” in 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002.
  10. S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks,” in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE, June 2002.
  11. Online. Available: ttp://lcawww.epfl.ch/Publications/LeBoudec/BucheggerL02.pdf
  12. A. Fasbender, D. Kesdogan, and O. Kubitz. Variable and scalable security: Protection of location information in mobile IP. In Proceedings of the 46th IEEE Vehicular Technology Conference, Atlanta, pages 963–967, 1996.
  13. Z. Haas. Securing ad hoc networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/Dezember, pages 24–30, 1999.
  14. B. R. Smith, S. Murthy, and J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pages 85–92, February 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network (MANET) security wireless network Cooperation Reputation Selfishness Malice nodes