StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security for Wireless Ad Hoc Networks - Research Paper Example

Summary
The paper “Security for Wireless Ad Hoc Networks” seeks to evaluate technology as one of the most significant hallmarks in existence in relation to the interactions between people. In this particular case, there exist various instruments that are related to technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Security for Wireless Ad Hoc Networks
Read Text Preview

Extract of sample "Security for Wireless Ad Hoc Networks"

Security for Wireless Ad Hoc Networks Abstract Technology is one of the most significant hallmarks in existence in relation to the interactions between people. In this particular case, it is significantly pertinent to note that there exist various instruments that are related to technology which have been instrumental in ensuring that the individuals in the world are connected, and the togetherness between them is further strengthened. For the acquisition of a better and knowledgeable understanding of these factors related to the phenomenon, it may be noteworthy to examine some of them. The technological development, which is in focus, in this case is in relation to mobile telephony. This is a technology, which has been in existence since the early 1980s. The other thing, which is worth noting, is that this technology seems to be rather dynamic for the purpose of keeping up with the various developments and changes that are taking place in the world. These changes are at times necessitated by the need for convenience on the part of users. It is this convenience that has brought about the aspect of wireless technology in mobile telephony. As opposed to just wireless communication, there are other newer developments that are taking advantage of this aspect of wireless communication. The precise example in this case is ad hoc mobile networks. Since the inception of mobile telephony, there are several technologies which have come to pass. In this case, these solutions and the technologies have been developed with the intention of overcoming the limitations, which are realized when making use of fixed infrastructure in the case of connectivity. It is also of the essence to note that the existence of this fixed infrastructure limits the adaption of wireless technology, which is more modern and new age. Bluetooth technology is the type of technology, which has brought to light the fact that wireless technology can be taken to another new level. Thanks to this technology, ad hoc networks have been realized. These are rather small mobile networks, which can also be said to be short-lived and are in operation in the absence of fixed telecommunication infrastructure. The main advantage of such networks is that they offer a rather quick deployment of wireless connectivity when fixed elements are not available. As opposed to just being situated in a single location, the various nodes that are available in the network are free to move around and fix or organize themselves in ways, which may not be prescribed for the users. This is the thing which about a significant level of convenience on the part of the user. There are several protocols which are applied for the purpose of bringing about the connectivity that comes thanks to these networks. The most popular one in this case is the IEEE 802.11 protocol for WI-FI networks, which brings about networking even at a low level when there is no presence of an access point. However, there is a flaw, which is exhibited in the case of such a network. This disadvantage is that the nodes, which exist in this network, are only in a position to send and receive information with each other. However, it is impossible for these nodes to route the information to other elements that are out of the network. The other thing, which is worth noting in relation to these networks, is that they can operate singly. In this case, they are standalone. At the same time, they can be connected to a larger network such as the internet, for example. Initially, it was a dream when it came to achieving connectivity anywhere, even on the go. However, with such networks this aspect has gone from dream to reality. The applications that run on mobile ad hoc networks are rather variant. These range from the large and dynamic mobile networks all the way to the small ones, which are also static and constrained by elements such as power supply. However, the algorithms, which bring about the proper functioning of such networks, are not dependent on the scale and size of the networks. However, these algorithms that brings about the functioning need to be properly distributed for the purpose of routing, bringing about proper network distribution not forgetting the scheduling of links therein. There are several factors, which have to be factored in when looking at the dynamics that are associated with the network. Examples of such include the quality of links on the network, the loss of propagation path not forgetting the topological changes, which may be experienced in the process. The network, which is established, ought to be one, which will be in a position to handle the various situations, which may come about in the course of operations. There are other notable things, which should be addressed properly depending on the type of network. An example in this case is with regards to the security of the network. There are various institutions, which will call for various security protocols depending on the nature of operations. For example, the nature of security in a military ad hoc network cannot be compared to the security level in a school network. For example, military networks are developed and designed in such a way that they cannot be intercepted. At the same time, the level of being detected ought to be as low as possible in order to deter any attempts by people who may be having the intention of breaching the security in the network. There are some types of mobile ad hoc networks, which can be identified. One of these is vehicular ad hoc networks. These are the types of networks, which allows for wireless communication between vehicles, say those that are in a convoy. Another application of this type of ad hoc network is in the communication between these vehicles and equipment, which may be located at the roadside. The other type of ad hoc network is the internet based ad hoc network. These are the ad hoc networks, which bring about the linkage between fixed internet gateway nodes and mobile nodes, which may be in the possession of ordinary people. In such a network, the normal complex ad hoc algorithms do not necessarily apply. There are certain concerns, which come about with regards to the attacks which may be perpetrated on ad hoc networks. These attacks come about on the various level of the network infrastructure. At the level of the application layer, the probable attack, which may come about, is through data repudiation and the inputting of malicious code in the system. At the physical layer, there may be the probability of eavesdropping, the jamming of traffic and the interference of the signals, which may be propagated. Communication is something, which is always evolving. At the same time, the infrastructure, which is applied in its fulfillment, is something, which has to be dynamic for the purpose of keeping up with these changes. It should be appreciated that there are various firms which are carrying out research and development for the purpose of bringing about further development on the technology and infrastructure which is currently in existence. Works Cited Anjum, Farooq, and Petros Mouchtaris. Security for wireless ad hoc networks. Hoboken, N.J.: Wiley-Interscience, 2007. Print. Maihöfer, C. ( 2004). "A Survey on Geocast Routing Protocols". IEEE Communications Surveys and Tutorials Misra, Sudip, Isaac Woungang, and Subhas Chandra Misra. Guide to wireless ad hoc networks. London: Springer, 2009. Print. Wagner, Dorothea, and Roger Wattenhofer. Algorithms for sensor and ad hoc networks advanced lectures. Berlin: Springer, 2007. Print. Wittenburg, Georg, and Jochen H. Schiller. Service placement in ad hoc networks. London: Springer, 2012. Print. Read More

CHECK THESE SAMPLES OF Security for Wireless Ad Hoc Networks

Security Solutions for MANETs (mobile ad-hoc networks) including the development of IDS

As compared to wired communication networks, the distinctive uniqueness of mobile ad hoc networks shows a number of significant issues to network security designing structure, like that open peer-to-peer network structure, strict resource limitations, collective wireless means as well as extremely influential network physical layout or topology.... In mobile or computer networks the privacy and security have turned out to be prime concerns in an attempt to offer secured transmissions among portable terminals in a threatening framework....
16 Pages (4000 words) Research Paper

Networking researh paper

Wireless networks are based on IEEE 802.... Setting up a Wireless Network at Home Wireless Local Area networks (WLANs) allow a user to connect to a local area network through wireless networking, like a small network in a house or an office.... Since all current high speed wireless networks are using IEEE standards, especially 802.... 1g, the term Wi-Fi is used to distinguish wireless networks from other traditional wired networks....
5 Pages (1250 words) Essay

Wireless Security

(2005) Special Issue on wireless ad hoc networks, IEEE J.... (2007) "A Performance Comparison of Multi-Hop wireless ad hoc Network Routing Protocols," Proc.... (2002)"Characterizing the Interaction Between Routing and MAC Protocols in Ad-hoc networks," Proc.... (2007) "Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc networks," Proc.... (2006) "Routing Protocols in Wireless Ad-hoc networks--A Simulation Study," master's thesis at Lulea University of Technology, Stockholm....
15 Pages (3750 words) Essay

Wireless Network Security

After testing on a publicly available wireless network infrastructure, ARAN is effective and efficient to analyze secure routes within an ad hoc wireless network (Authenticated Routing for ad hoc networks 2011).... uthenticated Routing for ad hoc networks 2011.... RSS for Authenticated Routing for ad hoc networks, .... Therefore, providing security for wireless networks that are gaining popularity day by day is a challenge.... uthenticated Routing for Ad-hoc networks (ARAN) operates on cryptographic system based on public key to eliminate all attacks that are identified....
7 Pages (1750 words) Essay

Monitoring Offshore Oil and Gas Processes Using Ad-Hoc Wireless Network

The paper "Monitoring Offshore Oil and Gas Processes Using Ad-Hoc Wireless Network" discusses that ad-hoc wireless networks are automated to reconfigure themselves in to correspond with structural changes in the network equipment layout or in the oil and gas industry plant design.... Disruptions in tightly coupled supply chain networks: the case of the US offshore oil industry.... The ad-hoc wireless network is suitably suited for offshore oil and gas processes in regard to its ability to circumvent the remote and harsh environmental challenges, in an offshore processing environment....
4 Pages (1000 words) Research Paper

Creating WiFi Hot Spot

Figure (ii) setting up a wireless ad hoc network ad hoc network allows file sharing and internet connection sharing as shown in figure (iii) below.... Figure (iii) wireless ad hoc network wizard step 3:Once the wizard is started it requires the desired network a name and a suitable security option selected.... A new wizard will open after clicking the link "Set up a new connection or network" that allows connecting virtual private networks, dial-up, setting up a new wireless connection, and creating a new ad hoc wireless network....
2 Pages (500 words) Lab Report

Network Security and Control Mechanisms - Threats and Challenges

Security for Wireless Ad Hoc Networks.... Ad-hoc networks 9 ... Ad-hoc networks ... Ultimately, the proper implementation and the management of security controls coupled with the best practices for wireless access restrictions are usually intended to mitigate risks that are associated with attacks.... security for Telecommunications Network Management.... Non-traditional networks 9 ... Securing wireless networks 14 ...
15 Pages (3750 words) Research Paper

Privacy Problems in Wireless Networks

d-hoc networks ... d-hoc networks are networks that are linked together in a peer-to-peer mode, these networks especially the wireless networks usually do not have access points that links them.... Networking 2007: ad hoc and sensor networks, wireless networks, next generation internet.... The essay "Privacy Problems in Wireless networks" focuses on the critical analysis of the major security concerns that a wireless network faces concerning privacy....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us