Research Proposal on "Security Analysis Mobile Ad Hoc Networks MANET"

Research Proposal 13 pages (3549 words) Sources: 5 Style: Harvard

[EXCERPT] . . . .

Mobile Adhoc Networks (manet)

The work of Corson and Macker (1999) entitled: "Mobile Ad Hoc Networking (MANET)" reports that advancements in computer and wireless communications technologies in recent years expectations are that advanced mobile wireless computing is expected to see increasingly widespread use and application, much of which will involve the use of Internet Protocol (IP) suite." (Corson and Macker, 1999)

Mobile ad hoc networking was envisioned as supporting operation in mobile wireless networks that is robust and efficient through incorporation of routing functionality into mobile nodes. These types of networks are viewed as being dynamic and rapidly changing in nature, "random, multihop topologies which are likely composed of relatively bandwidth-constrained wireless links." (Corson and Macker, 1999)

It was reported at that time that routing support for mobile hosts "is presently being formulated as 'mobile IP' technology which is designed to support "nomadic host 'roaming' where a roaming host may be connected through various means to the Internet other than its well-known fixed-address domain space. The host may be directly physically connected to the fixed network on a foreign subnet or be connected via wireless link, dial-up line, etc." (Corson and Macker, 1999)

Corson and Macker state that Mobile ad hoc Networking is similar to Mobile Packet Radio Networking as well as Mobile Mesh Networking, and Mobile, Multihop, Wireless Networking. The need for dynamic ad hoc networking technology is one stated to be both "current and future" and some applications of MAET technology might include "industrial and commercial
Continue scrolling to

download full paper
applications involving cooperative mobile data exchange" in addition to "mesh-based mobile networks...operated as robust, inexpensive alternatives or enhancements to cell-based mobile network infrastructures." (Corson and Macker, 1999) The military is in need of and will continue to need networking for "robust, IP-compliant data services within mobile wireless communication networks." Many of which are comprised of "highly-dynamic autonomous topology segments." (Corson and Macker, 1999)

A. Characteristics of MANETS

A MANET is stated to be comprised by "mobile platforms (e.g., a router with multiple hosts and wireless communications devices) herein simply referred to as 'nodes' which are free to move about arbitrarily." (Corson and Macker, 1999) The nodes are stated to be located in or on airplanes, ships, trucks, cars and even on people or small devices with multiple hosts per router possible. A MANET is stated to be an "autonomous system of mobile nodes" which may "operate in isolation, or may have gateways to go and interface with a fixed network internetwork." (Corson and Macker, 1999) Stub networks carry traffic originating at and/or destined for internal nodes, but do not permit exogenous traffic to 'transit' through the stub network." (Corson and Macker, 1999)

MANET nodes are equipped with "wireless transmitters and receivers using antennas which may be omnidirectional (broadcast), and highly directional (point-to-point), possibly steerable, or some combination thereof." (Corson and Macker, 1999) There are stated to be several "salient characteristics' of MANETS:

(1) Dynamic topologies: Nodes are free to move arbitrarily; thus, the network topology -- which is typically multihop -- may change randomly and rapidly at unpredictable times, and may consist of both bidirectional and unidirectional links; and (2) Bandwidth-constrained, variable capacity links: Wireless links will continue to have significantly lower capacity than their hardwired counterparts. In addition, the realized throughput of wireless communications -- after accounting for the effects of multiple access, fading, noise, and interference conditions, etc. -- is often much less than a radio's maximum transmission rate.

(3) Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or other exhaustible means for their energy. For these nodes, the most important system design criteria for optimization may be energy conservation.

(4) Limited physical security: Mobile wireless networks are generally more prone to physical security threats than are fixed-cable nets. The increased possibility of eavesdropping, spoofing, and denial-of-service attacks should be carefully considered. Existing link security techniques are often applied within wireless networks to reduce security threats. As a benefit, the decentralized nature of network control in MANETs provides additional robustness against the single points of failure of more centralized approaches. (Corson and Macker, 1999)

B. Focus of Market Research

The focus of the market research herein is the MANET and the potential for future expansion and application of the MANET. This will be accomplished through a qualitative review of literature on mobile ad hoc wireless networks. The work entitled: "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks" reports that security is a service that is "essential service for wired and wireless network communications. The success of Mobile Ad hoc Networks (MANET) strongly depends on people's confidence in its security. However, the characteristics of MANET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. This paper provides a survey on attacks and countermeasures in MANET. The countermeasures are features or functions that reduce or eliminate security vulnerabilities and attacks."

Gaertner and Cahill (2004) write that mobile ad hoc wireless networks currently have low communication quality."

Liu, Chen, Fang and Shea (2004) write of mobile ad hob wireless networking that "Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different quality of service (CoS) requirements in multihop mobile ad hoc networks." It is reported that "many channel-dependent mechanisms are proposed to address this issue based on the cross-layer design philosophy. However, a lot of problems remain before more efficient solutions are found. One of the problems is how to alleviate the conflict between throughput and fairness for different prioritized traffic, especially how to avoid the bandwidth starvation problem for low-priority traffic when the high-priority traffic load is very high. In this paper, we propose a novel scheme named Courtesy Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols." (Liu, Chen, Fang, and Shea, 2004)

The work of Chlamtac, Conti and Liu (2003) entitled: "Mobile Ad Hoc Networking: Imperatives and Challenges" states that MANETS "represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary 'ad-hoc' network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g. disaster recovery environments." The recent introduction of new technologies including Bluetooth, IEEE 802.11 and Hyperlan are "helping enable eventual commercial MANET deployments outside the military domain."

Chlamtac, Conti, and Liu (2003) state that a primary goal in the 4G wireless evolution is the provision of "...pervasive computing environments that can seamlessly and ubiquitously support users in accomplishing their tasks, in accessing information or communicating with other users at anytime, anywhere, and from any device . In this environment, computers get pushed further into background; computing power and network connectivity are embedded in virtually every device to bring computation to users, no matter where they are, or under what circumstances they work." Stated to be the new trend is helping users in everyday tasks through exploitation of both technologies and infrastructures "hidden in the environment without requiring any major change in the user's behavior." It is stated that the new trend has as its basis the concept of "Ambient Intelligence" which has as its objective the "...integration of digital devices and networks into the everyday environment, rendering accessible, through easy and "natural" interactions, a multitude of services and applications. Ambient intelligence places the user at the center of the information society. This view heavily relies on 4G wireless and mobile communications. 4G is all about an integrated, global network, based on an open systems approach. Integrating different types of wireless networks with wire-line backbone network seamlessly, and convergence of voice, multimedia and data traffic over a single IP-based core network are the main foci of 4G. With the availability of ultra-high bandwidth of up to 100 Mbps, multimedia services can be supported efficiently; ubiquitous computing is enabled with enhanced system mobility and portability support, and location-based services are all expected." (Chlamtac, Conti, and Liu, 2003)

The following figure illustrates the networks and components in the 4G network architecture.

Figure 1

Source: Chlamtac, Conti, and Liu (2003)

It is stated that 4G networks are held out to be "hybrid broadband networks that integrate different network topologies and platforms." (Chlamtac, Conti, and Liu, 2003) Figure 1 shows the overlapping of different network boundaries which is stated to represent the "integration of different types of networks in 4G. There are stated to be two levels of integration:

(1) First is the integration of heterogeneous wireless networks… READ MORE

Quoted Instructions for "Security Analysis Mobile Ad Hoc Networks MANET" Assignment:

I have to create a contextual report for my last year of uni, which is kinda like a disseration paper.

The topic i chose for this was security analysis mobile adhoc networks. I choose this topic because there are currently a lot of security issues related to mobile adhoc networks, and it would be easy to create an artefact for it.

The contextual report itself can be divided into three sections:

1. Introduction

2. The Contextual Review (includes: market research & market surveys)

3. Planning for the artefact (Output from market research & market surveys)

For the 3rd part you will need a bit info on my artefact (solution to security issues regarding Mobile Adhoc Networks):

I will use the output from market survey & market survey to create a secure mobile adhoc network using packet tracer (a program made by cisco) or NS2 (Open Source Networking tool).

Citation/ references should be in Harvard style.

The sources you will use should include journals & websites

And any findings should be as recent as possible.

I will email more info on contextual report and market survey to your email. *****

How to Reference "Security Analysis Mobile Ad Hoc Networks MANET" Research Proposal in a Bibliography

Security Analysis Mobile Ad Hoc Networks MANET.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112. Accessed 3 Jul 2024.

Security Analysis Mobile Ad Hoc Networks MANET (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112
A1-TermPaper.com. (2010). Security Analysis Mobile Ad Hoc Networks MANET. [online] Available at: https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112 [Accessed 3 Jul, 2024].
”Security Analysis Mobile Ad Hoc Networks MANET” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112.
”Security Analysis Mobile Ad Hoc Networks MANET” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112.
[1] ”Security Analysis Mobile Ad Hoc Networks MANET”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112. [Accessed: 3-Jul-2024].
1. Security Analysis Mobile Ad Hoc Networks MANET [Internet]. A1-TermPaper.com. 2010 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112
1. Security Analysis Mobile Ad Hoc Networks MANET. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/mobile-adhoc-networks-manet/740112. Published 2010. Accessed July 3, 2024.

Related Research Proposals:

Saving Energy in Ad Hoc Wireless Networks Article Review

Paper Icon

Saving Energy in Ad Hoc Wireless Networks

The objective of this study is to compare a research paper titled "Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc… read more

Article Review 5 pages (1706 words) Sources: 5 Style: MLA Topic: Energy / Power


Network Research Encountering -- and Countering Research Paper

Paper Icon

Network Research

Encountering -- and Countering -- Unstructured Attacks: Current Issues in Network Security Monitoring

As technology and information networks continue to grow in complexity and in sheer size, and… read more

Research Paper 10 pages (2984 words) Sources: 10 Topic: Computers / IT / Internet


Security Risk Assessment Essay

Paper Icon

Security Risk Assessment

The steps involved with a Security Risk Assessment Preparation are to establish the security controls that are currently in place and to determine whether additional security controls… read more

Essay 2 pages (676 words) Sources: 2 Topic: Management / Organizations


Network Management System Assessment

Paper Icon

Network Management

Define network management

The planning, implementing, securing and managing network systems across an enterprise are the foundational elements of effective network management. As information technologies (IT) have become… read more

Assessment 3 pages (909 words) Sources: 4 Topic: Management / Organizations


Network Plan for ABC Corporation Essay

Paper Icon

Network Plan for ABC Corp

Scenario

ABC Corporation has just recently installed new routers onto the network and intends to design the appropriate network security to prevent the malicious and… read more

Essay 9 pages (2595 words) Sources: 8 Topic: Computers / IT / Internet


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!