Nobody downloaded yet

Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS - Research Paper Example

Comments (0) Cite this document
Summary
The paper "Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS" states that mobile ad hoc networks have the capability to establish networks on the air in possible harsh situations where is not possible to set-up customary network arrangements. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS
Read TextPreview

Extract of sample "Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS"

Download file to see previous pages The diverse issues obviously formulate a situation for developing multi-fence safety answers that attain both wide security as well as enviable network performance (Yang, Luo, Ye, lLu, & Zhang, 2004) and (Nash, 2000). This paper presents a comprehensive analysis of mobile ad hoc security issues and offers security solutions for MANETs (mobile ad-hoc networks) including the development of IDS (Intrusion Detections System). This paper is aimed at assessing some of the main aspects of the MANETs (mobile ad-hoc networks) technology and possible security issues. This paper also suggests state-of-the-art security solutions in addition to mitigation actions those can be adapted to formulate better security of wireless communication systems.
As the significance of network and computer communication technologies in our everyday life augments it as well poses new requirements for connectivity. However, the traditional wired technology and communication solutions have been there for an extensive era but there is increasing need of operational and working wireless systems and solutions in all the areas of life such as study, using the internet, sending E-mail messages, altering data and information in a convention and so on. However, there exist diverse solutions regarding technology systems to fulfill these requirements. In this scenario, a solution could be wireless LAN that is designed on the basis of IEEE 802.11 standard. On the other hand, there is increasing need or demand for connectivity in circumstances where there is no backbone link or else base station accessible, for instance when two or additional Personal Digital Assistants require to be linked (Rashmi, 2008).
MANETs (Mobile ad hoc networks) have intrinsically come up with diverse characteristics as compared to the conventional wired arrangement. However, mobile ad hoc networks have attained considerably growing attention, somewhat due to the possible establishment of the Mobile ad hoc networks for countless purposes.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Solutions for Mobile Ad-hoc Networks Including the Research Paper, n.d.)
Security Solutions for Mobile Ad-hoc Networks Including the Research Paper. Retrieved from https://studentshare.org/information-technology/1748685-security-solutions-for-manetsmobile-ad-hoc-networks-including-the-development-of-ids
(Security Solutions for Mobile Ad-Hoc Networks Including the Research Paper)
Security Solutions for Mobile Ad-Hoc Networks Including the Research Paper. https://studentshare.org/information-technology/1748685-security-solutions-for-manetsmobile-ad-hoc-networks-including-the-development-of-ids.
“Security Solutions for Mobile Ad-Hoc Networks Including the Research Paper”, n.d. https://studentshare.org/information-technology/1748685-security-solutions-for-manetsmobile-ad-hoc-networks-including-the-development-of-ids.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS

Routing Protocols for Ad-hoc Wireless Network

.... Further, we will discuss the possible technology implementation proposal of wireless ad-hoc network for first responders. The basic benefit of a wireless network lies in the capability of its node to communicate to any location while being mobile. The wireless network paradigm has developed two basic system models for itself. The first is the fixed backbone wireless system model comprising of a vast number of mobile nodes and comparatively lesser in number, but more robust, fixed nodes that are hard wire with the help of the landlines. A fixed node communicates with a mobile node that...
20 Pages(5000 words)Dissertation

Mobile telephone networks

...Introduction Information technologies prolong to spread out the limitations of enabling experience of education anytime and anywhere. The integration of mobile and high fidelity networks in to any computing device demonstrates innovative experience for the students to access educational resources. The mobile technology devices include laptops, personal digital assistants, mart phones, mobile phones, global positioning system (GPS) devices, and wireless Point of Sales (POS) terminals. These devices provide variety of communication technologies for students. 2 Advantages of Communication Networks for Students The cell phone is a...
4 Pages(1000 words)Assignment

Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS

...?SECURITY SOLUTIONS FOR MANETS (MOBILE AD-HOC NETWORKS) INCLUDING THE DEVELOPMENT OF IDS Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS Author Author Affiliation Date Table of Contents Abstract 3 Introduction 3 MANET Technology Overview 5 Security Issues in MANET 6 Security Solutions for MANET 8 Security Principles for MANET 8...
16 Pages(4000 words)Research Paper

Mobile Computing and Social Networks

...and advancements in mobile computing and social networks, the issue of privacy and security has become increasingly critical. Users and developers of mobile applications and social networks are becoming more and more concerned about the issue of confidentiality, privacy and security (MacVittie, 2012). This is because most of the mobile-based applications and social networks have compromised security and privacy measures. This threat is further compounded by the reality of hackers who tend threaten security and privacy of users. Mobile...
10 Pages(2500 words)Term Paper

Mobile Computing and Social Networks

...: 1). Quite a few market research studies also forecast a new internet revolution on mobile phones. Some of the new smart phones are more powerful than computers and operate in the ‘intimate’ space, accompanying people throughout the day (Arora 2012: 1). The convenience and capability to access data or do certain tasks with the help of applications from homes or any other public place using mobile devices even without a desktop computer has ensured a considerable increase of convenience and efficiency for businesses and people on the move The smart phone technology research and development wing has become very active in recent years and is improving day by day. Mobile...
10 Pages(2500 words)Essay

Mobile Telecom Networks

..., communications, information, and railway networks. Many earlier literatures have analyzed the major economic features of networks, such as Gandal et al. (2000), who studyies the development of CD technology and concludes that the number of CD titles available greatly affects consumers' willingness-to-pay for CD players. Shurmer (1993) uses consumer survey results to analyze network externalities in software by questioning consumers directly about their attitudes towards software standards. Park (2003) studies the role of network effects in the standard war of the video recording systems. However, most of these literatures concern about are concerned...
19 Pages(4750 words)Essay

Mobile Ad Hoc Wireless Network

...Mobile Ad Hoc Wireless Network (MANET) Protocols, Performance and Scope in the near Future A brief of the study Table of Content: Introduction: In this section we will describe MANET, the "mobile ad hoc network". It is an autonomous system of mobile routers (and associated hosts) connected by wireless and links thus forming an arbitrary graph. The routers may organize themselves randomly and the resultant topology depends on these movements. These networks can work in an individual fashion as well connected with other networks. There's lot more to...
2 Pages(500 words)Admission/Application Essay

Wireless ad hoc network management

...) stress, dynamic policies need to be supported for automated network control based on dynamic re-evaluation of communication capabilities and assets of an ad hoc network. 2.4 Secure and Robust Finally, an ad hoc network management system should be secure and robust. It should allow secure exchange of management data among authorized users, and enhance the overall survivability of the network (ICT Director). This may require the means to authenticate and authorize users, and support encryption capabilities. In addition, the system should allow...
4 Pages(1000 words)Essay

UWB Ad-Hoc Networks

...is a promising area in which to create small, high bit rate transceivers that can cope with numerous applications. Some of these that are obvious are the use of ad hoc networks for wireless corporate local area networks. At the moment, industry does not consider the use of wireless networks for networking. This is because at the moment existing wireless technology is still too slow to go to support a corporate environment of any reasonable size. UWB may be able to address this. UWB also allows for more efficient services for mobile phone networks, including less interference and wider...
40 Pages(10000 words)Essay

Mobile Computing and Social Networks

...the phone. Secondly, it is also important to consider the safety and security factor while transferring data and info0rmation. The possibility of data hacking can hamper the privacy aspect of the users. Last but not the least; it is highly important for the users to change the password of devices and SIM cards on a frequent basis to strengthen the security aspect of Smartphone. References Barker, M. (2012). Social media marketing. New Jersey: Pearson. Basagni, S. (2013). Mobile ad hoc networking. London: Routledge. Hwang, K. (2013). Distributed and Cloud Computing. New York: Springer. Phan, T. (2010). Mobile computing,...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security Solutions for Mobile Ad-hoc Networks Including the Development of IDS for FREE!

Contact Us