Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet

Mamata Rath, Bibudhendu Pati, Jhum Swain
DOI: 10.4018/978-1-7998-8545-0.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.
Chapter Preview
Top

Introduction

When there is some difficulty in communication system in a network environment, the best solution is offered by MANET where it is possible to create communication even in the absence of physical infrastructure. MANET is a specially designed wireless network that supports connectivity in very critical situations such as during hardware break down or where physical connection is a major issue. Because of high effectiveness of MANET and VANET based networks and their self-sufficient nodes, they can provide communication facility smoothly in such cases. Due to multi-jump transfer capability in appropriated way these MANETs(Rath et.al, 2014) are critical in calamity circumstances, for example, combat zone for communication, military condition and cataclysmic events. Headway of technology with situation has been developed in numerous structures in current remote communication((L.K. Shar et.al, 2015). Because of unstable network topology, and developments of nodes dependably change powerfully in numerous ways, it is absolutely hard to control and oversee such an incautious circumstance and communicating with neighbor nodes with propose co-activity is another dreary issue. Administration of Quality of Service and its reasonable control is additionally empowering.

Figure 1.

A general MANET scenario with device connectivity

978-1-7998-8545-0.ch010.f01

Figure 1 A general MANET scenario with device connectivity where a sender device sends information to its neighbor device and then the messages is forwarded through intermediate nodes. During data communication from sender to beneficiary, there are numerous requirements in the way containing way discovering, node choosing, identification of connection disappointments, route upkeep, route repair, holding steering tables and to take amend choice of parcel quickening towards the heading of correct goal. Motivation behind the current survey article has been drawn from various security challenges (Rath et.al, 2018) and vulnerability in Ad-hoc Networks both in MANET and VANET.

Organisation of the Chapter

Section 1 presents the introduction part that describes the MANET and VANET concept with challenges in their routing strategies. Section 2 presents security protocols with different techniques used for routing in MANET and VANET. Section 3 offers a description of Key Factors Used in MANET and VANET for Security Evaluation. Next section 4 narrates Safekeeping Approaches Used in MANET and VANET Protocols. Section 5 offers explanation of Protection and Confidentiality preserving scheme in VANET and the last segment offers the conclusion part.

Security Protocols with Different Approaches in MANET and VANET

Unicast routing protocols in MANET provide right methods of creating routes from source node to destination node and they also support route maintenance during topology change with reliability of the messages (Rath et.al, 2016). Classification of various unicast routing protocols are presented in Figure 2. Though many routing protocols based on these classification has been developed by experts in networking, still security during communication (Rath et.al, 2019) remains a major challenge specifically during real time transmission of data.

Figure 2.

Classification of MANET Routing Protocols

978-1-7998-8545-0.ch010.f02

In VANET the design of an effective routing protocol largely depends on communication between vehicles and from mobile vehicle to road side units(Rath et.al, 2018). In VANET, the routing technique is different than MANET because of the high level of mobility of running vehicles and sudden change of topology. Reducing end to end delay during data transmission always remains the basic challenge in both MANET and VANET.

Figure 3.

VANET Routing Protocols

978-1-7998-8545-0.ch010.f03

Based on many factors such as handling the network overhead, speed and accuracy, the correct protocol design should be carried out to satisfy the communication need with better quality of service(Rath et.al, 2019). According to the dynamic features of VANET, and considering the effective response in diverse environment, the VANET protocols have been classified into various categories such as ad-hoc or topology driven, location based, cluster based, broadcast and geo-cast protocols. They are diagrammatically represented in Figure 3.

Complete Chapter List

Search this Book:
Reset