Deepak Gupta’s research while affiliated with Ganga Institute of Technology and Management and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 2: Variation of shortest path route selection between SAR and other routing algorithms 
Figure 3: Sample working of SRP 
Figure 4: Hash chains in SEAD 
Figure 5: Hash chains in SEAD 
Figure 6: Trust architecture and FMS within each node of a Confidant 

+1

Security Issues Pertaining to Ad Security Issues Pertaining to Ad Security Issues Pertaining to Ad Security Issues Pertaining to Ad--- -Hoc Networks Hoc Networks Hoc Networks Hoc Networks - -- -A A A A Survey Survey Survey Survey
  • Article
  • Full-text available

January 2012

·

110 Reads

·

3 Citations

·

Deepak Gupta

·

Shankar Kumar Vijay

A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links—the union of which form an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. MANETs are usually set up in situations of emergency for temporary operations or simply if there are no resources to set up elaborate networks. These types of networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, mainly due to the nature of the mobile devices (e.g. low power consumption, low processing load). Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Besides the general security objectives like authentication, confidentiality, integrity, availability and non-repudiation, the ad hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to analyze threats faced by the ad hoc network environment and provide a classification of the various security mechanisms. We analyzed the respective strengths and vulnerabilities of the existing routing protocols and suggest a broad and comprehensive framework that can provide a tangible solution.

Download

Citations (1)


... They do not need any access point, centralized administration and other static centralizations [1]. The mobility of nodes causes unstable topology and absence of a fixed predefined infrastructure is the main reason for lack of security in such kinds of wireless networks [2]. ...

Reference:

A Survey for Prevention of Black Hole Attacks in Wireless Mobile AdHoc Networks Using Trusted Neighbor Nodes
Security Issues Pertaining to Ad Security Issues Pertaining to Ad Security Issues Pertaining to Ad Security Issues Pertaining to Ad--- -Hoc Networks Hoc Networks Hoc Networks Hoc Networks - -- -A A A A Survey Survey Survey Survey