02-08-2014, 03:18 PM
A Paper in Mobile Ad-hoc Networks
about Maintaining its Survivability
A Paper in Mobile.pdf (Size: 146.8 KB / Downloads: 17)
ABSTRACT
In general, Security techniques pursue two defense lines: one preventive and the second
one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and
cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as
Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to
facilitate network s to complete their functions properly and significantly even In the presence of
Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established
Survivability concepts and its association with preventive, reactive and Tolerance defense lines.
Survivable MANETs will be capable to accomplish their purposes and aims by means of the
cooperation between those three defense lines. Key Properties of Survivability as resistance,
acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs
were examined. In conclusion, this function highlights that a completely Survivable MANET be
supposed to be appropriate cooperatively the three defense lines as an alternative of only one or
two lines separately
INTRODUCTION
The word MANET (Mobile Ad-hoc
Network) refers to a multi-hop Packet Based
Wireless network composed of a set of Mobile
Nodes that can exchange Information and at the
same time move, without using any kind of
permanent infrastructure. MANET is In fact self
Organizing and Adaptive network s that can be
A Paper in Mobile Ad-hoc Networks
about Maintaining its Survivability
SOHAIB AHMAD, FAHEEM KHAN, MUKHTAR AHMAD ,
SHAZIA NAEEM, M.N .KHALID and ASIA BEGUM
Islamia College University Peshawar, KPK Pakistan
Gandahara University Peshawar, KPK Pakistan
(Received: January 10, 2013; Accepted: January 25, 2013)
ABSTRACT
In general, Security techniques pursue two defense lines: one preventive and the second
one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and
cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as
Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to
facilitate network s to complete their functions properly and significantly even In the presence of
Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established
Survivability concepts and its association with preventive, reactive and Tolerance defense lines.
Survivable MANETs will be capable to accomplish their purposes and aims by means of the
cooperation between those three defense lines. Key Properties of Survivability as resistance,
acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs
were examined. In conclusion, this function highlights that a completely Survivable MANET be
supposed to be appropriate cooperatively the three defense lines as an alternative of only one or
two lines separately.
Key words: Survivability, Intrusion Tolerance, MANETs, Security.
formed and deformed on the fly without the
requirement of any Centralized administration. As
for other Packet Data network s, one to-one
Communication Ina MANET is attained by unicast
Routing every single Packet. Routing In MANET is
exigent due to the limitation presented on the
transmission Bandwidth battery power and CPU
time and the need to manage with the repeated
topological alterations resultant from the mobility
Manets initiatives for survivablity
This Section explains a number of
Initiatives on structure Survivable Mobile ad-hoc
Networks. In spite of that a lot of them do not present
a total Survivable suggestion, they have purposes,
characteristics and techniques more connected to
Properties and needs of Survivability than just
preventive or reactive methods. this function
focuses on Security proposition that combined
more than one defense line and affect some
procedure of Tolerance as redundancy or
improvement. Initiatives found In the literature are
classified on three main groups: route discovery,
Data forwarding, and Key management and access
Control. The route discovery group consists of
approaches demanding to make route discovery
phase of Routing Protocols additional resistant and
tolerant to dissimilar kinds of Attacks and Intrusion.
The Data forwarding group is composed of
Initiatives particular on Data forwarding using
preventive or reactive Security methods and some
Tolerance procedures, as redundancy. The last one
contains cryptographic Key management and
access Control approaches build to be further
tolerant to Attacks Solutions. The majority of the
presented Protocols have supposed MANETs as
a confidence environment. On the other hand, as
shown In earlier sections, MANETs are extremely
susceptible to Attacks due to their characteristics.
safe Routing Protocols have been projected such
as SRP15, SAODV20, SAR21. These protected
Protocols are typically based on verification.
CONCLUSION
This paper observes Survivable
approaches whose purpose is to facilitate network
s to complete their functions properly and
significantly even In the presence of Intrusions. In
this paper we construct the very interrelated
Survivable MANET ideas where either preventive
or reactive techniques are combined implemented
with tolerant technique. We categorize the defense
lines getting into account Intrusion Tolerance
techniques as well as classify Properties and needs
of Survivability. The Initiatives are classified In three
groups: