Views 
   PDF Download PDF Downloads: 865

 Open Access -   Download full article: 

A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability

Sohaib Ahmad, Faheem Khan, Mukhtar Ahmad , Shazia Naeem, M.N .Khalid and Asia Begum

Islamia College University Peshawar, KPK Pakistan.

Gandahara University Peshawar, KPK Pakistan

Article Publishing History
Article Received on :
Article Accepted on :
Article Published :
Article Metrics
ABSTRACT:

In general, Security techniques pursue two defense lines: one preventive and the second
one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and
cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as
Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to
facilitate network s to complete their functions properly and significantly even In the presence of
Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established
Survivability concepts and its association with preventive, reactive and Tolerance defense lines.
Survivable MANETs will be capable to accomplish their purposes and aims by means of the
cooperation between those three defense lines. Key Properties of Survivability as resistance,
acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs
were examined. In conclusion, this function highlights that a completely Survivable MANET be
supposed to be appropriate cooperatively the three defense lines as an alternative of only one or
two lines separately.

KEYWORDS: Survivability; Intrusion Tolerance; MANETs; Security

Copy the following to cite this article:

Ahmad S, Khan F, Ahmad M, Naeem S, Khalid M. N, Begum A. A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability. Orient. J. Comp. Sci. and Technol;6(1)


Copy the following to cite this URL:

Ahmad S, Khan F, Ahmad M, Naeem S, Khalid M. N, Begum A. A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability. Orient. J. Comp. Sci. and Technol;6(1). Available from: http://www.computerscijournal.org/?p=2685



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.