Agent Technology & MANET Research Paper

Exclusively available on Available only on IvyPanda® Written by Human No AI

Ad hoc has the implication of a connection method involving a network and most often than not, it works in association with devices that are wireless. For the device to function efficiently as well as effectively a base station is not a requirement and only one session is the exact duration that is established by the connection. Instead of the base stations, Ad hoc devices are capable of discovering other similar devices that fall within a specific range, therefore forming a special form of a network incorporating computers.

Ad hoc devices are capable of searching and identifying specific nodes that are a target but existing out of range through a system of network flooding by the application of some broadcasts brought forward from the nodes. These Ad hoc connections have multiple applications.

MANET, (mobile ad-hoc network), is one type of network of ad-hoc that is wireless and is linked to mobile routers through a wireless connection. This connection brings about a union that is a result of a topology of arbitrary nature. These routers are capable of an arbitrary organization achieved through a free as well as random movement. This topology formed by wireless networks is quite unstable and therefore unpredictable as well as rapid transformations are expected at any time. The MANET, therefore, has the option of connecting to the entire network or it may as well assume the operation of the fashion of the standalone.

The basic component behind the operation of the MANET is a wireless node each of which has the potential to be a sender at one time, a receiver at another time, or even a router. At the time the node is sending, messages can be received at specific destinations as has been directed through the use of some route. When the node is functioning to receive messages, then any node can be the source of the message.

At the time the node is functioning in the place of a router it serves to relay messages to the intended destination as well as the immediate router along the route. The movement of These nodes is one of random nature and therefore the message arrives right on time at the intended destination. MANET exhibits the dynamic feature in its makeup across its wireless users making it function in an atmosphere devoid of infrastructure as well as a configuration.

Atypical MANET exhibits certain features, the most important being the absence of an infrastructure that is central in contrast to the other mobile networks that are equipped with some base stations. MANET functions for the purpose of accessing the desired destinations as well as servers that are deployed to facilitate the functioning of the network. All nodes, therefore, have the capability of being routers whereas all of these devices that are wireless have an interconnection amongst themselves and the entire network does not have a central connection. The nodes, therefore, are solely responsible to deliver messages as well as discovering the topology due to the self-configuration nature of this network.

The topology exhibited by MANET is dynamic in nature with nodes having the freedom of an arbitrary movement. This movement is the root cause of rapid changes in the network topology which cannot be predicted from time to time. The network can locate alternative pathways automatically enhancing the forwarding of data through the multiple paths as allowed for by this network through the application of diverse routing mechanisms.

The operations of MANET are energy-constrained. The nodes of MANET are devices that are powered by a battery which is ideally an exhaustible energy means and therefore the need for the conservation of power is an important aspect as far as this network is concerned.

MANET is physically associated with limited security. In consideration that mobile wireless networks are exposed to threats of physical security, cases of interception, attacks eavesdropping as well as being denied the necessary service, MANET is more insecure as compared to other networks that make use of fixed cables. They, therefore, have high requirements.

The Security and Vulnerability

The security of MANET is an essential component for the basic net functions, such as sending of package and routing: net operation easily undergoes danger, if countermeasures were not previously built in the base net functions at the early stages of design.

In contrast to the networks, which use the specialized units for the support of base functions, in ad-hoc networks, these functions are performed by all accessible nodes. This essential difference lies on the level of the core of the problems of protection, which are specific in ad-hoc networks. The nodes of the ad-hoc network cannot be entrusted in contrast to the specialized nodes of the classical network, and it cannot be guaranteed, that they will correctly fulfill critical net functions.

Typical Realization

When the hardware, protected from the unskillful rotation, and a strict identification infrastructure are not available, for example, in the open environment, where the general authority, which regulates network, does not exist, any unit of ad-hoc of the network, can be subject to danger the safety of the base functions such as routing. The correct operation of the network requires not only the correct fulfillment of critical net functions by each participating node, but it also requires that each node would carry out the clearly specific portion of these functions.

The threats, which are examined in MANET are not, thus, limited to harmful intentions and the new type of abnormal behavior, called (selfishness), must be also taken into consideration in order to avoid situations, in which the nodes simply do not interact.

The existing ad-hoc protocols of routing, in general, undergo two types of attacks: active attacks and passive attacks. The attack is considered active when the anomalously leading node bears some power expenditures when executing threats, while passive attacks occur mainly because of the absence of collaboration for the purpose of energy conservation.

The nodes, which carry out active attacks for the purpose of damaging other nodes, which leads to the failure of the network, are considered malicious, while nodes, which carry out passive attacks for the purpose of the retention of the period of battery service for their own interactions, are considered as selfish.

The malicious nodes can destroy the correct functioning of the routing protocol, changing routing information, fabricating false routing, and playing the role of other nodes. Furthermore, there are also attacks, which were called a wormhole. On the other side, selfish units can substantially worsen net productivity and, eventually, dividing the network, simply without participating in the network operations.

Problems

As long as many of the attacks on the wireless networks are similar to the attacks on standard networks, MANET networks are located in large danger. One of the largest problems is WEP (Wired Equivalent Privacy), standard encrypting data for wireless networks.

In WEP several vulnerabilities are discovered, which make it possible to be broken through in a short time. Another problem is connected with the open nature of MANET. Because of the special features of wireless networks, it is complicated to control the region of the signal accessibility.

In contrast to simple networks, it leads to the fact that the hacker can control or overhear network from locations, which were not intended for maintenance when the network was created. MANET also can be used for creating backdoors for standard networks. Many organizations spend thousands and even millions of dollars for guaranteeing the protection of standard networks, but it is sufficient for only one unscrupulous or uninformed wireless user, connected with the standard network, and it is possible to easily create a backdoor, which circumvents all complex and expensive protective systems, thus, making possible for a hacker to obtain access to the thoroughly closed network. Thus, all properties of safety, characteristic of standard networks, are inherent in wireless networks.

Threats

There are many potential threats for MANET, such as denial of service (DOS), the session takes over, and sniffing (overhearing net traffic). The utilities for sniffing appeared from the first days of the appearance of most local networks and were intended for facilitating network administration. However, inappropriate hands these utilities – sniffers became powerful tools for hackers, which make it possible to intercept passwords and other information, transferred by the local network.

Sniffers are traditionally considered sufficiently complex utilities, which require specific skills for working with them, and often it requires complex management.

All this changed in the last several years, when there appeared and adopted, widely easy in use specialized sniffers of passwords. Many of these utilities of the new generation are freely accessible on the Internet. Having the built-in database, which makes it possible to understand many net protocols, sniffers filter net traffic online, separating only required information (such as bond of usernames-passwords).

Conclusion and Suggestions

Mobile ad-hoc networks are a key factor in the development of wireless communications. These networks inherit the traditional problems of wireless and mobile connection, such as the optimization of capacity, the control of power, improvement in the quality of the transmission of data. Furthermore, their multilink nature and the probable absence of stable structure introduce the new aspects of studies, such as line pattern, the detection of device, support of topology, and also ad-hoc- addressing and internal control of routing.

Routing is the basis of network infrastructure. It controls and governs the flow of communications in the network. In order to establish and support the improved] net topology, routers exchange reports about the state of the connections, its cost, and metrics.

For wireless Ad Hoc networks, a deficiency in the support of fixed infrastructures and frequent changes in the network topology makes the problems of safe routing more complex. In Ad Hoc networks there is a shortage of the resources of power. Cryptography based based on the open keys is too expensive. But problem consists in how safe connections between the source and the receiver can be established will be before the route between them is established. That could be a topic for further researches in that field.

Work cited page

Annie, B, Electronic Commerce, IGI, ISBN:1599049430, 2005.

Sandro, E, Stephen, M, Trust Management, Springer, ISBN:0387736549, 2007.

Vaidy, S, S, Computation Science, Springer, ISBN:3540260439, 2005.

Vipin, S, Ad Hoc and Sensor, ACM Press ISBN:1581137834, 2003.

Yan, Z, Wireless Security, IGI, ISBN:159904899X, 2008.

Yang, X, Security in Sensor Network, CRC Press, ISBN:0849370582, 2006.

Yue, H, Computation Intelligence and Security, Birkhauser, ISBN;3540308199, 2005.

Siddhartha, Gupte, Mukesh, S. Secure Routing in Mobile Wireless Ad hoc Networks (2004). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, October 29). Agent Technology & MANET. https://ivypanda.com/essays/agent-technology-amp-manet/

Work Cited

"Agent Technology & MANET." IvyPanda, 29 Oct. 2021, ivypanda.com/essays/agent-technology-amp-manet/.

References

IvyPanda. (2021) 'Agent Technology & MANET'. 29 October.

References

IvyPanda. 2021. "Agent Technology & MANET." October 29, 2021. https://ivypanda.com/essays/agent-technology-amp-manet/.

1. IvyPanda. "Agent Technology & MANET." October 29, 2021. https://ivypanda.com/essays/agent-technology-amp-manet/.


Bibliography


IvyPanda. "Agent Technology & MANET." October 29, 2021. https://ivypanda.com/essays/agent-technology-amp-manet/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1