Innovations in Computing and Information Technology (Cognition 2015) |
Foundation of Computer Science USA |
COGNITION2015 - Number 2 |
July 2015 |
Authors: Komal |
72ef1fcf-14be-4dac-9741-1099284e3cea |
Komal . Compromised Security of Wireless Ad-Hoc Networks and its Implications. Innovations in Computing and Information Technology (Cognition 2015). COGNITION2015, 2 (July 2015), 25-30.
Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous networks with self-governed devices having peer-to-peer, real-time communication. Wireless ad-hoc networks have applicability in numerous areas including critical ones like disaster relief, crisis management, alert systems and military purposes. However, the autonomous nature of wireless ad-hoc networks (WANETs) makes them vulnerable to security breaches and attacks. The paper presents a security model for wireless ad-hoc networks and discusses security loopholes in ad-hoc networking with their repercussions.