About this paper

Appears in:
Pages: 6178-6180
Publication year: 2011
ISBN: 978-84-615-0441-1
ISSN: 2340-1117

Conference name: 3rd International Conference on Education and New Learning Technologies
Dates: 4-6 July, 2011
Location: Barcelona, Spain

SECURITY PROBLEMS PERTAINING TO E- CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS

P. Balagangadhar Rao

Sree Kavitha Engineering College (INDIA)
Security strength and network performance are the two sides of a coin. If, one of these is enhanced, the other will suffer. Achieving a good trade-off between these two extremes is a fundamental challenge in security design for mobile ad-hoc networks which are basically self-organised wireless interconnecting communication devices that would either extend (or) operate in concert with the wired networking infrastructure.

Lot of research is going on in this field in respect of the unique characteristics of ad-hoc networks such as open peer-to-peer network architecture, shared wireless medium, highly dynamic topology and stringent resource constraints. These limitations make a strong case for building multi-fence security solutions that meet both the goals of security as well as desirable network performance. Ad-hoc networks can be established on demand and disappear when there is no need, traditional security solutions applicable to wired-networks will not be sufficient because of the inherent limitations of such networks. In such an open and distributed communication environment, a central authorisation facility that makes more stringent security will not be available. Self organisation in ad-hoc networks aims to bring orderliness to the evolving distributed systems with the least possible human intervention. The three important characteristics of such a self organised systems are - I.P (Internet Protocol) auto-configuration, peer-to-peer networking, and shared open-content web pages.
The fundamental security problem in mobile ad-hoc network is: the protection of its basic functionality to deliver the "data bits" from one node to the other. Unlike wired networks that have dedicated routers, each mobile node in an ad-hoc network will function as a router and forward packets to other peer nodes. Two basic approaches to protect mobile ad-hoc networks are: proactive and reactive.

In this paper, an attempt is made to discuss certain fundamental security design challenges like denial-of-service attacks, providing link-layer security support, protecting routing and forward protocal, secured authentication and end-to-end communication through data encryption, preventing viruses, worms and application abuses, at different layers in a wireless ad-hoc network.
@InProceedings{BALAGANGADHARRAO2011SEC,
author = {Balagangadhar Rao, P.},
title = {SECURITY PROBLEMS PERTAINING TO E- CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS},
series = {3rd International Conference on Education and New Learning Technologies},
booktitle = {EDULEARN11 Proceedings},
isbn = {978-84-615-0441-1},
issn = {2340-1117},
publisher = {IATED},
location = {Barcelona, Spain},
month = {4-6 July, 2011},
year = {2011},
pages = {6178-6180}}
TY - CONF
AU - P. Balagangadhar Rao
TI - SECURITY PROBLEMS PERTAINING TO E- CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS
SN - 978-84-615-0441-1/2340-1117
PY - 2011
Y1 - 4-6 July, 2011
CI - Barcelona, Spain
JO - 3rd International Conference on Education and New Learning Technologies
JA - EDULEARN11 Proceedings
SP - 6178
EP - 6180
ER -
P. Balagangadhar Rao (2011) SECURITY PROBLEMS PERTAINING TO E- CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS, EDULEARN11 Proceedings, pp. 6178-6180.
User:
Pass: