2018
DOI: 10.2478/jee-2018-0026
|View full text |Cite
|
Sign up to set email alerts
|

Security architecture for the mobile ad hoc networks

Abstract: Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and rout… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…For the scattered context in mobile ad hoc networks, Filipek and Hudec [15] propose a secure structure based on a PKI, trust model, firewall (MANETs), and intrusion prevention system (IPS). Nodes' L0 through L3 of privileges are defined by their trust level, which can be lowered or removed in response to harmful activity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For the scattered context in mobile ad hoc networks, Filipek and Hudec [15] propose a secure structure based on a PKI, trust model, firewall (MANETs), and intrusion prevention system (IPS). Nodes' L0 through L3 of privileges are defined by their trust level, which can be lowered or removed in response to harmful activity.…”
Section: Related Workmentioning
confidence: 99%
“…By developing a secure attack detection and recognition that takes into account issues like a safe path to endpoints for transmission of data, negligible node energy usage, and the innovation of protection schemes that really can come to terms with egoistic and harmful attacks on the entire network, the security concerns in MANET can be resolved [10][11][12][13][14][15]. The assault detection mechanism for the MANET has not yet been implemented completely.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the RSA encryption algorithm is used for authentication service in [17]. Public key algorithms are preferred in WANETs due to their effectiveness in terms of key management, confidentiality, and authentication, as shown in [17,[26][27][28][29]. For example, random predistribution of keys (RPK) [30] would not perform well in our target scenario due to the following reasons: (i) First, the random key predistribution schemes that use symmetric cryptography are found susceptible to the replication attack.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are various approaches to implementing PKI in WANETs by addressing different concerns. A few examples are [17,23,24,[26][27][28][29][30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation