Malicious behaviour of node and its significant security techniques in MANET- a review
Mobile adhoc network is one of the major discussed topic in the field of wireless network and communication system from past few decades. Various extensive research work conducted in the past shows that mobile adhoc network is shrouded with various type of issues e.g. dynamic topologies, ineffici...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
INSI Publications
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/33173/ http://irep.iium.edu.my/33173/ http://irep.iium.edu.my/33173/1/286-293.pdf |
id |
iium-33173 |
---|---|
recordtype |
eprints |
spelling |
iium-331732014-08-12T00:39:45Z http://irep.iium.edu.my/33173/ Malicious behaviour of node and its significant security techniques in MANET- a review Khan, Burhan ul Islam Olanrewaju, Rashidah Funke Habaebi, Mohamed Hadi TK5101 Telecommunication. Including telegraphy, radio, radar, television Mobile adhoc network is one of the major discussed topic in the field of wireless network and communication system from past few decades. Various extensive research work conducted in the past shows that mobile adhoc network is shrouded with various type of issues e.g. dynamic topologies, inefficient routing policies, unwanted energy depletion, and security. Although various solutions has been explored for addressing other issues in MANET, but solutions previously introduced for mitigating security threats in MANET are yet to be standardized or found robust enough. One of the root causes for the same is that there is a tremendous amount of unpredictability in the behavior of the mobile nodes in MANET, be it regular node or erroneous node or malicious node. Hence, this paper discusses only the significant research work that has been introduced in the past for the purpose of mitigating security threats in MANET. INSI Publications 2013-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/33173/1/286-293.pdf Khan, Burhan ul Islam and Olanrewaju, Rashidah Funke and Habaebi, Mohamed Hadi (2013) Malicious behaviour of node and its significant security techniques in MANET- a review. Australian Journal of Basic and Applied Sciences, 7 (12). pp. 286-293. ISSN 1991-8178 http://www.ajbasweb.com/ajbas_Octoberr_2013.html |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television Khan, Burhan ul Islam Olanrewaju, Rashidah Funke Habaebi, Mohamed Hadi Malicious behaviour of node and its significant security techniques in MANET- a review |
description |
Mobile adhoc network is one of the major discussed topic in the field of wireless
network and communication system from past few decades. Various extensive
research work conducted in the past shows that mobile adhoc network is shrouded
with various type of issues e.g. dynamic topologies, inefficient routing policies,
unwanted energy depletion, and security. Although various solutions has been
explored for addressing other issues in MANET, but solutions previously introduced
for mitigating security threats in MANET are yet to be standardized or found robust
enough. One of the root causes for the same is that there is a tremendous amount of
unpredictability in the behavior of the mobile nodes in MANET, be it regular node
or erroneous node or malicious node. Hence, this paper discusses only the
significant research work that has been introduced in the past for the purpose of
mitigating security threats in MANET. |
format |
Article |
author |
Khan, Burhan ul Islam Olanrewaju, Rashidah Funke Habaebi, Mohamed Hadi |
author_facet |
Khan, Burhan ul Islam Olanrewaju, Rashidah Funke Habaebi, Mohamed Hadi |
author_sort |
Khan, Burhan ul Islam |
title |
Malicious behaviour of node and its significant security techniques in MANET- a review |
title_short |
Malicious behaviour of node and its significant security techniques in MANET- a review |
title_full |
Malicious behaviour of node and its significant security techniques in MANET- a review |
title_fullStr |
Malicious behaviour of node and its significant security techniques in MANET- a review |
title_full_unstemmed |
Malicious behaviour of node and its significant security techniques in MANET- a review |
title_sort |
malicious behaviour of node and its significant security techniques in manet- a review |
publisher |
INSI Publications |
publishDate |
2013 |
url |
http://irep.iium.edu.my/33173/ http://irep.iium.edu.my/33173/ http://irep.iium.edu.my/33173/1/286-293.pdf |
first_indexed |
2023-09-18T20:47:56Z |
last_indexed |
2023-09-18T20:47:56Z |
_version_ |
1777409800044281856 |