Open Access Open Access  Restricted Access Subscription Access

A Paper in Mobile Ad-Hoc Networks about Maintaining its Survivability


Affiliations
1 Islamia College University, Peshawar, KPK, Pakistan
 

In general, Security techniques pursue two defense lines: one preventive and the second one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to facilitate network s to complete their functions properly and significantly even In the presence of Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established Survivability concepts and its association with preventive, reactive and Tolerance defense lines. Survivable MANETs will be capable to accomplish their purposes and aims by means of the cooperation between those three defense lines. Key Properties of Survivability as resistance, acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs were examined. In conclusion, this function highlights that a completely Survivable MANET be supposed to be appropriate cooperatively the three defense lines as an alternative of only one or two lines separately.

Keywords

Survivability, Intrusion Tolerance, MANETs, Security.
User
Notifications
Font Size

Abstract Views: 230

PDF Views: 0




  • A Paper in Mobile Ad-Hoc Networks about Maintaining its Survivability

Abstract Views: 230  |  PDF Views: 0

Authors

Sohaib Ahmad
Islamia College University, Peshawar, KPK, Pakistan
Faheem Khan
Islamia College University, Peshawar, KPK, Pakistan
Mukhtar Ahmad
Islamia College University, Peshawar, KPK, Pakistan
Shazia Naeem
Islamia College University, Peshawar, KPK, Pakistan
M. N. Khalid
Islamia College University, Peshawar, KPK, Pakistan
Asia Begum
Islamia College University, Peshawar, KPK, Pakistan

Abstract


In general, Security techniques pursue two defense lines: one preventive and the second one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to facilitate network s to complete their functions properly and significantly even In the presence of Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established Survivability concepts and its association with preventive, reactive and Tolerance defense lines. Survivable MANETs will be capable to accomplish their purposes and aims by means of the cooperation between those three defense lines. Key Properties of Survivability as resistance, acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs were examined. In conclusion, this function highlights that a completely Survivable MANET be supposed to be appropriate cooperatively the three defense lines as an alternative of only one or two lines separately.

Keywords


Survivability, Intrusion Tolerance, MANETs, Security.