We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Mobile Ad Hoc Network Security Issues

by Tejashree Kokate, Ram Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 16
Year of Publication: 2014
Authors: Tejashree Kokate, Ram Joshi
10.5120/18993-0447

Tejashree Kokate, Ram Joshi . Mobile Ad Hoc Network Security Issues. International Journal of Computer Applications. 108, 16 ( December 2014), 6-9. DOI=10.5120/18993-0447

@article{ 10.5120/18993-0447,
author = { Tejashree Kokate, Ram Joshi },
title = { Mobile Ad Hoc Network Security Issues },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 16 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number16/18993-0447/ },
doi = { 10.5120/18993-0447 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:43:07.430860+05:30
%A Tejashree Kokate
%A Ram Joshi
%T Mobile Ad Hoc Network Security Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 16
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper studies mobile Ad hoc network technology uses and how it can be used in real life applications. As now a day's lots of Research is going on automotive vehicles, if mobile ad hoc network is used to represent vehicles on roads and vehicle to vehicle communication is made possible then travelling will be easy and enjoyable. Due to mobile nature and scalability in mobile ad hoc networks anyone in the network can communicate anytime anywhere. This paper gives quick overview of existing technologies in MANETs.

References
  1. Quansheng Guan, Richard Yu, "Joint Topology Control and Authentication De- sign in Mobile Ad Hoc Networks With Cooperative Communications", IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 6, JULY 2012.
  2. Na Ruan, Yoshiaki Hori, "DoS attack-tolerant TESLA-based broadcast authenti- cation protocol in Internet of Things", 2012 International Conference on Selected Topics in Mobile and Wireless Networking, pp 60 65, Apr. 2012.
  3. Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, and Fuyou Miao A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
  4. Qiwei Lu; Yan Xiong; Wenchao Huang; Xudong Gong; Fuyou Miao, "A Dis- tributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Com- puting in MANET", 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 656 665, 2012
  5. Maity, S. ; Hansdah, R. C. , "A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation", 27th International Con- ference on Advanced Information Networking and Applications Workshops, pp363 370, 2012
  6. Pallavi D. Dudhe et al, International Journal of Computer Science and Mobile Computing, Vol. 3 Issue. 4, April- 2014, pg. 671-676
  7. Int. J. Advanced Networking and Applications Volume: 6 Issue: 2 Pages: 2253-2261 (2014) ISSN : 0975-0290
  8. (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks
  9. International Journal of Computational Engineering Research Vol, 03 Issue, 6
  10. Maria Striki, John S. Baras, Towards Integrating Key Distribution with Entity Authentication for Efficient, Scalable and Secure Group Communication in MANETs
Index Terms

Computer Science
Information Sciences

Keywords

MANET based vehicular communication security issues Securing mobile ad hoc network vehicle to vehicle communication protocol VNETs security issues