Wireless communication employs radio technology to facilitate data transmission without any fixed infrastructures. A mobile ad hoc network is an example of this data transmission technique, which comprises of devices such as smart phones, laptops and printers. Some of the key features of mobile ad hoc networks include self-creation, self-organization and also self-administration. Owing to the frequent mobility of the network nodes and the dynamic topology, mobile ad hoc networks are vulnerable to numerous security threats. For instance, the nodes are open and the links can be disconnected, leading to the degradation of network performance. To mitigate these problems, several protocols and techniques have been proposed in literature. This paper provides some detailed review of these protocols, as well as the discussion of other state of the art protocols that have been developed to cope with challenges of the legacy routing and security protocols. These protocols were established to be either proactive or reactive. In addition, it has been noted that these protocols have some merits as well as challenges that may impede their applicability. Consequently, more efficient and secure routing protocols are required for optimal network performance. Therefore, some recommendations are given towards the end of this paper on some features that ideal routing and security protocol should have.
Software security is concerned with the protection of data, facilities and applications from harm that may be occasioned by malware attacks such as password sniffing, viruses and hijacking. It is a system-wide concept that takes into account both security mechanisms such as access control as well as the design for security, such as a robust design that renders software attack complicated. It may encompass building of secure software, which comprises of the designing of software to be attack-resistant, ensuring that software is error-free, and educating software developers, architects, and users about the building of secure artifacts. In this regard, insecure software negatively affects organization’s reputations with customers, partners, and investors. The goal of this paper is to investigate some of the issues that make the software insecure, as well as the approaches that have been developed to boost software quality and security. The outcomes indicate that various models, techniques, frameworks and approaches to software quality have been developed over the recent past. However, only a few of them give reliable evidence for creating secure software applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.