Security for Mobile and Adhoc Network
A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and to implement the centralized security control on it will not be an efficient way to secure the MANE...
Gespeichert in:
Veröffentlicht in: | International journal of innovative technology and exploring engineering 2020-05, Vol.9 (7), p.1351-1353 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1353 |
---|---|
container_issue | 7 |
container_start_page | 1351 |
container_title | International journal of innovative technology and exploring engineering |
container_volume | 9 |
creator | Lone, Manzoor Ahmad Afzal, Dr Mohammad Mazhar |
description | A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and to implement the centralized security control on it will not be an efficient way to secure the MANET networks though it will be the wastage of time and resources as well. When there is no centralized security in any network it always becomes vulnerable for the different attacks and can provide any way for the attacker to intrude into the Network or in the particular device. MANET is designed using the number of other small portable devices, although this system does not use any router, so that the centralized security could have work to protect the same network. But in this Network there is no router only the single Portable device is responsible for the attacks. It is really very hard and complicated to maintain this kind of network where it is defined that each end device will provide the security on its own, since there are the number of challenges when the security is concerned. In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique. Attackers are always updated with the new and efficient ways how any network can be breached and thus it makes them intelligent to attack on any network. No matter security, engineers are always working to check the loopholes in their own system and trying to protect their networks butthe hackers to attack the network are inventing number of ways. When any network is being attacked by the attackers, the important data can be compromised. Data is very important asset for any industry and when the same valuable data is breached this can lead any organisation into serious issues. MANET does not use the strong centralized security system but there are always the best possible solutions which can be used to make sure that MANET can be used to make sure that of the attacker try to attack this Network he will find it much complicated to attack and intrude into the network hence will lead the attacker for the unsuccessful attack. This is very important to keep in consideration that before using any model of the network the security of the network should always keep in priority because more the secure Network is more efficient it will be. |
doi_str_mv | 10.35940/ijitee.E2905.059720 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_35940_ijitee_E2905_059720</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_35940_ijitee_E2905_059720</sourcerecordid><originalsourceid>FETCH-LOGICAL-c910-7e8ff16377b555f9c723a133f13cbaaf43dfd12cd555e90a694f53911e9109be3</originalsourceid><addsrcrecordid>eNpNz09LAzEQBfAgCpbab-AhF4-7zmQ2m82xlPoHqh7sPWSTCW6trmRXpN_e0vXgaR4M78FPiGuEkrSt4LbbdSNzuVYWdAnaGgVnYqaUaQoCo8__5UuxGIYdACBV2NR2Jm5eOXznbjzI1Gf51LfdnqX_jHIZ3_ogn3n86fP7lbhIfj_w4u_OxfZuvV09FJuX-8fVclMEi1AYblLCmoxptdbJBqPII1FCCq33qaKYIqoQj1-24GtbJU0WkY9t2zLNRTXNhtwPQ-bkvnL34fPBIbgT1k1Yd8K6CUu_pbJH-g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Security for Mobile and Adhoc Network</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Lone, Manzoor Ahmad ; Afzal, Dr Mohammad Mazhar</creator><creatorcontrib>Lone, Manzoor Ahmad ; Afzal, Dr Mohammad Mazhar ; HOD Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India ; Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</creatorcontrib><description>A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and to implement the centralized security control on it will not be an efficient way to secure the MANET networks though it will be the wastage of time and resources as well. When there is no centralized security in any network it always becomes vulnerable for the different attacks and can provide any way for the attacker to intrude into the Network or in the particular device. MANET is designed using the number of other small portable devices, although this system does not use any router, so that the centralized security could have work to protect the same network. But in this Network there is no router only the single Portable device is responsible for the attacks. It is really very hard and complicated to maintain this kind of network where it is defined that each end device will provide the security on its own, since there are the number of challenges when the security is concerned. In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique. Attackers are always updated with the new and efficient ways how any network can be breached and thus it makes them intelligent to attack on any network. No matter security, engineers are always working to check the loopholes in their own system and trying to protect their networks butthe hackers to attack the network are inventing number of ways. When any network is being attacked by the attackers, the important data can be compromised. Data is very important asset for any industry and when the same valuable data is breached this can lead any organisation into serious issues. MANET does not use the strong centralized security system but there are always the best possible solutions which can be used to make sure that MANET can be used to make sure that of the attacker try to attack this Network he will find it much complicated to attack and intrude into the network hence will lead the attacker for the unsuccessful attack. This is very important to keep in consideration that before using any model of the network the security of the network should always keep in priority because more the secure Network is more efficient it will be.</description><identifier>ISSN: 2278-3075</identifier><identifier>EISSN: 2278-3075</identifier><identifier>DOI: 10.35940/ijitee.E2905.059720</identifier><language>eng</language><ispartof>International journal of innovative technology and exploring engineering, 2020-05, Vol.9 (7), p.1351-1353</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Lone, Manzoor Ahmad</creatorcontrib><creatorcontrib>Afzal, Dr Mohammad Mazhar</creatorcontrib><creatorcontrib>HOD Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</creatorcontrib><creatorcontrib>Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</creatorcontrib><title>Security for Mobile and Adhoc Network</title><title>International journal of innovative technology and exploring engineering</title><description>A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and to implement the centralized security control on it will not be an efficient way to secure the MANET networks though it will be the wastage of time and resources as well. When there is no centralized security in any network it always becomes vulnerable for the different attacks and can provide any way for the attacker to intrude into the Network or in the particular device. MANET is designed using the number of other small portable devices, although this system does not use any router, so that the centralized security could have work to protect the same network. But in this Network there is no router only the single Portable device is responsible for the attacks. It is really very hard and complicated to maintain this kind of network where it is defined that each end device will provide the security on its own, since there are the number of challenges when the security is concerned. In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique. Attackers are always updated with the new and efficient ways how any network can be breached and thus it makes them intelligent to attack on any network. No matter security, engineers are always working to check the loopholes in their own system and trying to protect their networks butthe hackers to attack the network are inventing number of ways. When any network is being attacked by the attackers, the important data can be compromised. Data is very important asset for any industry and when the same valuable data is breached this can lead any organisation into serious issues. MANET does not use the strong centralized security system but there are always the best possible solutions which can be used to make sure that MANET can be used to make sure that of the attacker try to attack this Network he will find it much complicated to attack and intrude into the network hence will lead the attacker for the unsuccessful attack. This is very important to keep in consideration that before using any model of the network the security of the network should always keep in priority because more the secure Network is more efficient it will be.</description><issn>2278-3075</issn><issn>2278-3075</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpNz09LAzEQBfAgCpbab-AhF4-7zmQ2m82xlPoHqh7sPWSTCW6trmRXpN_e0vXgaR4M78FPiGuEkrSt4LbbdSNzuVYWdAnaGgVnYqaUaQoCo8__5UuxGIYdACBV2NR2Jm5eOXznbjzI1Gf51LfdnqX_jHIZ3_ogn3n86fP7lbhIfj_w4u_OxfZuvV09FJuX-8fVclMEi1AYblLCmoxptdbJBqPII1FCCq33qaKYIqoQj1-24GtbJU0WkY9t2zLNRTXNhtwPQ-bkvnL34fPBIbgT1k1Yd8K6CUu_pbJH-g</recordid><startdate>20200530</startdate><enddate>20200530</enddate><creator>Lone, Manzoor Ahmad</creator><creator>Afzal, Dr Mohammad Mazhar</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20200530</creationdate><title>Security for Mobile and Adhoc Network</title><author>Lone, Manzoor Ahmad ; Afzal, Dr Mohammad Mazhar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c910-7e8ff16377b555f9c723a133f13cbaaf43dfd12cd555e90a694f53911e9109be3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Lone, Manzoor Ahmad</creatorcontrib><creatorcontrib>Afzal, Dr Mohammad Mazhar</creatorcontrib><creatorcontrib>HOD Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</creatorcontrib><creatorcontrib>Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</creatorcontrib><collection>CrossRef</collection><jtitle>International journal of innovative technology and exploring engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lone, Manzoor Ahmad</au><au>Afzal, Dr Mohammad Mazhar</au><aucorp>HOD Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</aucorp><aucorp>Department of Computer Science & Engineering, Glocal University Saharanpur, UP, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security for Mobile and Adhoc Network</atitle><jtitle>International journal of innovative technology and exploring engineering</jtitle><date>2020-05-30</date><risdate>2020</risdate><volume>9</volume><issue>7</issue><spage>1351</spage><epage>1353</epage><pages>1351-1353</pages><issn>2278-3075</issn><eissn>2278-3075</eissn><abstract>A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and to implement the centralized security control on it will not be an efficient way to secure the MANET networks though it will be the wastage of time and resources as well. When there is no centralized security in any network it always becomes vulnerable for the different attacks and can provide any way for the attacker to intrude into the Network or in the particular device. MANET is designed using the number of other small portable devices, although this system does not use any router, so that the centralized security could have work to protect the same network. But in this Network there is no router only the single Portable device is responsible for the attacks. It is really very hard and complicated to maintain this kind of network where it is defined that each end device will provide the security on its own, since there are the number of challenges when the security is concerned. In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique. Attackers are always updated with the new and efficient ways how any network can be breached and thus it makes them intelligent to attack on any network. No matter security, engineers are always working to check the loopholes in their own system and trying to protect their networks butthe hackers to attack the network are inventing number of ways. When any network is being attacked by the attackers, the important data can be compromised. Data is very important asset for any industry and when the same valuable data is breached this can lead any organisation into serious issues. MANET does not use the strong centralized security system but there are always the best possible solutions which can be used to make sure that MANET can be used to make sure that of the attacker try to attack this Network he will find it much complicated to attack and intrude into the network hence will lead the attacker for the unsuccessful attack. This is very important to keep in consideration that before using any model of the network the security of the network should always keep in priority because more the secure Network is more efficient it will be.</abstract><doi>10.35940/ijitee.E2905.059720</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2278-3075 |
ispartof | International journal of innovative technology and exploring engineering, 2020-05, Vol.9 (7), p.1351-1353 |
issn | 2278-3075 2278-3075 |
language | eng |
recordid | cdi_crossref_primary_10_35940_ijitee_E2905_059720 |
source | EZB-FREE-00999 freely available EZB journals |
title | Security for Mobile and Adhoc Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T22%3A44%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20for%20Mobile%20and%20Adhoc%20Network&rft.jtitle=International%20journal%20of%20innovative%20technology%20and%20exploring%20engineering&rft.au=Lone,%20Manzoor%20Ahmad&rft.aucorp=HOD%20Department%20of%20Computer%20Science%20&%20Engineering,%20Glocal%20University%20Saharanpur,%20UP,%20India&rft.date=2020-05-30&rft.volume=9&rft.issue=7&rft.spage=1351&rft.epage=1353&rft.pages=1351-1353&rft.issn=2278-3075&rft.eissn=2278-3075&rft_id=info:doi/10.35940/ijitee.E2905.059720&rft_dat=%3Ccrossref%3E10_35940_ijitee_E2905_059720%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |