lnu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security in Mobile Ad-Hoc Networks
Linnaeus University, Faculty of Technology, Department of Computer Science.
2014 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

                                       

Abstract

The number of wireless networks has been growing incessantly during the recent years. Ad hoc networks transmit digital data through radio frequency or wireless communications links, which is an open medium. According to this fact it is important to gain substantial knowledge about the advantages and the drawbacks associated with them for network security purposes. According to the vulnerability of these networks (wireless Ad hoc) to malicious attacks and hackers, there seems to be a necessity to address the potential risks of using these networks.

An Ad-Hoc is a system of wireless mobile nodes that dynamically self-organize in temporary network topologies. People and vehicles can thus be internetworked in areas without a preexisting communication infrastructure or when the use of such infrastructure requires wireless extension.  

Therefore, one should focus on a proper Security Standards as well as solid secure construction. There are a vast variety of malicious attacks against mobile Ad hoc networks. In order to distinguish these attacks some classifications (attack models) are presented. Different malicious techniques against communications of the network are discussed in order to introduce the best practice, to set-up and maintain a secure mobile Ad hoc network. In this paper a solid intrusion detection system for MANET presented along with the best solution for creates a trust relation among nodes. Information gathering (Passive attack) is discussed from an ethical point of view.

Place, publisher, year, edition, pages
2014. , 37 p.
Keyword [en]
Wireless Networks, Ad-Hoc Networks, Network security, Malicious Attacks, Security Standards, HADOF, SAR, Ethical Hacking, Ad-Hoc Routing protocols
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:lnu:diva-38335OAI: oai:DiVA.org:lnu-38335DiVA: diva2:766014
Subject / course
Computer Science
Educational program
Network Security Programme, 180 credits
Supervisors
Examiners
Available from: 2014-11-26 Created: 2014-11-25 Last updated: 2014-11-26Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Khalili, Ali
By organisation
Department of Computer Science
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

Total: 237 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf