Shahram Mohammadi
Abstract
Mobile ad hoc networks include sets of nodes that can freely communicate with each other without having any network infrastructure and through radio frequencies. These networks' speed ...
Read More
Mobile ad hoc networks include sets of nodes that can freely communicate with each other without having any network infrastructure and through radio frequencies. These networks' speed of establishment and unstructured nature has made them critical in various fields, especially military and emergency applications. The issue of security in these networks is one of the most important research topics today. Mobility of nodes, mobility of communication, dynamic change of network structure, lack of centralized management to check behaviors and functions, lack of specific defense lines, and limitation in consumption power of nodes provide a suitable platform for various attacks against these networks. The attacks in these networks are somehow different from those in other networks, and of course, the systems used to detect attacks in these networks are different from those in common wired networks. Mobile ad hoc networks are collections of mobile nodes that can be dynamically formed anywhere and anytime without network infrastructure. Most of these node’s act as routers and hosts at the same time. This property has made it possible to use these networks when forming a network with a fixed and predefined structure, such as military cases or floods, is impossible. Communication between nodes in these networks is done through radio waves, and if a node is in the radio range of another node, it is considered a neighbor of that node, and otherwise, if there is a need for communication between two nodes that are in the radio range of each other are not, the help of other nodes can be used in this case. Therefore, the communication between nodes in these networks is somehow based on trust and cooperation between nodes. What needs to be paid special attention to in the applications of these networks is the limitation of the resources used in them. Therefore, the evaluation criteria of these networks differ from those of wired networks.