By Topic

A survey of survivability in mobile ad hoc networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Lima, M. ; Lab. d''Inf. de Paris 6 (LIP6), UniversitePierre et Marie Curie, Paris ; dos Santos, A.L. ; Pujolle, G.

Many efforts have been done towards secure MANETs, but the conventional lines of defense are still inefficient to put all attacks off. This article examines survivable approaches whose goal is to enable networks to fulfill correctly their critical functions even in the presence of attacks or intrusions. We introduce the most relevant survivable MANET initiatives where either preventive or reactive defenses are combined with tolerant ones. We classify the defense lines taking into account intrusion tolerance mechanisms and also identify properties and requirements of survivability. The initiatives are categorized in three groups: routing discovery, data transmission and key management. For each one, they are correlated in terms of requirements and properties. The survey shows that security solutions do not yet explore relevant survivability properties and have only focused on one network layer or one type of attack.

Published in:

Communications Surveys & Tutorials, IEEE  (Volume:11 ,  Issue: 1 )