International Journal of Scientific & Engineering Research Volume 2, Issue 9, September-2011 1
ISSN 2229-5518
IJSER © 2011
http://www.ijser.org
Privacy Anxiety and Challenges in Mobile Ad Hoc
Wireless Networks and its Solution
Krishan Kant Lavania, G. L. Saini, Kothari Rooshabh H., Yagnik Harshraj A.
Abstract— Mobile Ad hoc networks are recent wireless networking model for cellular phone hosts. Ad hoc networks do not rely on any
stable infrastructure because they are independent. As an alternative, to remain network connected hosts rely on each other. It signifies
complex distributed systems that encompass wireless mobile nodes. These nodes can freely and dynamically self-organize into
uninformed and provisional, ‘‘ad-hoc’’ network topologies. This topology allows citizens to effortlessly interconnect in areas where no pre-
existing communication infrastructure. In this paper, we talk about security issues, challenges and their solutions in the mobile ad hoc
network. There are numerous security threats that disturb the development of mobile ad hoc network because of the exposed nature of the
mobile ad hoc network. We have first studied the prime vulnerabilities in the mobile ad hoc networks, which have made our work much
easier to endure from attacks than the usual wired network. The security criteria of the mobile ad hoc network and the main attack types
that exist are explained in this paper. As a final point we analyzed the recent security solutions for the mobile ad hoc network [1].
Index Terms— Minimum 7 keywords are mandatory, Keywords should closely reflect the topic and should optimally characterize the
paper. Use about four key words or phrases in alphabetical order, separated by commas.
—————————— ——————————
1 INTRODUCTION
An ad hoc network is a set of wireless mobile nodes that
forms a momentary network with no central organization.
In this situation, it may be essential for one mobile node to
enroll other hosts for forwarding a packet from source node
to its destination node due to the restricted transmission
range of wireless network interfaces. Each mobile node op-
erates as a router for forwarding packets for many other
mobile nodes in the network that may not have direct
communication range of each other. To discover multihop
paths through network each node participates with other
node in an ad hoc routing protocol. This proposal of Mobile
ad hoc network is also called infrastructure less networking
[2].
Ad hoc networks have a unique set of challenges and prob-
lems, although mobile ad hoc networks have numerous ad-
vantages over the traditional wired networks. For example
the supply constraints on nodes in ad hoc networks bound
the cryptographic procedures that are used for secure mes-
sages. That’s why it is legally responsible to fix attacks rang-
ing from passive masquerade to active masquerade. Second-
ly, mobile nodes with no enough protection are easy to con-
ciliation. An attacker can listen, modify and attempt to cover-
up all the traffic on the wireless communication channel as
one of the valid node in the network. Thirdly, in provisions
of security solution and for the vigorously changing topolo-
gy static configuration is not sufficient. In conclusion, defi-
ciency of cooperation and guarded ability is common in
wireless MANET. In universal, due to its fundamental uni-
queness of the wireless MANET, it is vulnerable.
A MANET Example
Fig. Shows MANET Example
2 MANET CONCEPT
A mobile ad hoc network is a set of wireless nodes that can
dynamically be set up at everyplace and anytime without
using any pre-existing network infrastructure. It is an self-
sufficient system in which mobile hosts connected by wire-
less links. They are free to move randomly and often oper-
ate as routers at the same time. The traffic types in ad hoc