SlideShare a Scribd company logo
1 of 20
Security issues and Challenges in
MANET-VANET-FANET: A Survey
 Security is one of the key important factors in ad hoc network
due to the open wireless medium and dynamic topology of the
network.
 MANET, VANET and FANET are type of ad hoc network and their
applications are served the end users in real environment.
VANET and FANET are next generation network and due to safety
applications more attractions for end users in these networks.
 It will provide the survey on security issues and challenges in
the field of MANET, VANET and FANET. The successful
implementation of these networks in real environment, it is
require the network will be secure and end user can take
benefit from their life safety applications.
2
 Vehicular ad-hoc network is a special kind of network in which nodes
(Vehicles) can communicate with each other on the road and with its
Infrastructure.
3
V2I
 Safety Applications
 Non Safety Applications
Work
in Progress
Plz! use Alt.
route
Work Zone
Warning:!!!
Work Zone
Warning:!!!
Shopping MALL
Parking Slot
Available!!!
RSU Parking Slot
Available!!!
4
 Security and privacy pay an important role to make the VANET
superstitions, popular and unique all the transportation
system.
 For this purpose identify the some security requirement to
fulfill the privacy needs and provide secure wireless
communication between the two vehicles.
 Every communication model has a special set of security
requirements.
 Identification
 Authentication
 Element authentication
 Privacy conservation
 Non- repudiation
 Confidentiality
 Availability
 Trust
 Mobile ad-hoc network (MANET) is a collection of wireless nodes that are
interconnected each other and dynamically setup anyplace or anytime
exclusive of having the pre-existence transportation.
 There are two variations mobile network: infrastructure and substructure
small network. In the case of Infrastructure network mobile communicate
through the base station that are connected to fixed infrastructure and
the infrastructure of less networks is known as the mobile ad- hoc
networks.
 Mobile ad-hoc network correspond to the composite distributed system
MANET requisite exceptionally flexible technology without any fixed base
station.
Figure 1. Architecture of Mobile ad-hoc Network (MANET) [1]
 VANET is a basically development system that increase the traffic safety
and reduce the road accidents. VANET is a wireless technology that
moves the car through the nodes and transfers the messages one node to
another node.
 Node are communicating single hop multi hop and also provide the huge
range of network to capture the signals and send the messages.
Defiantly, VANET technology enhances the security and traffic
transportation. Vehicular communication is involved of the nearby
vehicles and the appropriate design of VANET to provide the better
safety driving.
Figure 2. Architecture of Vehicular ad-hoc network (VANET) [2]
 Rapid technology advances on electronic device and communication
technologies, it has been probable to construct unmanned aerial
vehicle (UAV) system, which can fly separately or can be manage
slightly.
 FANET especially case of MANET attribute and the high degree mobility.
The FANET topology change more frequently, when the ordinary
infrastructure is out of service or not available. The major essential
component routing in FANET bandwidth play the critical role in the
process of large amount of data routing decision.
Figure 3. Architecture of Flying ad-hoc network (FANET) [4]
Figure 4. Architecture of MANET, VANET and FANET [5]
 The Security issues and challenges in MANET are given below:-
 Active Attacks: Active Attack achieves the attacker for
duplicate; transform and removal of exchange also try to modify
the behavior of protocol. Number of times identify the active
attack however active attack fewer used by an attacker.
Basically active attack modifies the data packets, inject the
packet and drop the packet.
 Passive Attacks: Passive attack is difficult to be identifying.
Routing packet and attacker may understand about a node.
Passive attack objective the privacy characteristic of network
and complete for distinguish the communication prototype
among nodes.
 The Security issues in VANET are given below:-
 Threats to Availability
 The threats to availability of vehicle-to-vehicle and vehicle-to-
roadside communication are given below:
 1)Denial of Service Attack: Denial service attack can be complete with
approve of indoor and out door network. In the cause of VANET produce
the artificial messages like Flooding and Jamming.
 2)Broadcast Tampering: This attack is supported out by an insider. It
contributes false safety messages into the VANET to impose damage or
detriment to the road users. When attackers influence the traffic on a
clear route then accident can happen.
 3)Malware: This attack is frequently approved by insiders more than
outsiders and when a firm ware update is done it can be downloaded
into the system.
The Security challenges in VANET are given below:-
 Real Time Constraints: VANET achieve the real time constraints so,
required the specific timing to deliver the massages. Achieve this goal
use very fast cryptographic algorithm.
 Data consistency Liability: Data consistency is important in VANET and
avoids the unnecessary information because authenticate node execute
the malicious.
 Key Distribution: VANET use the key to send and receive the messages
encrypts the message and after procedure complete decrypt the
message that’s why key distribution is an important procedure and
perform the major challenge.
 High mobility: High mobility is required in VANET nodes are connected
each other’s and transfer the signals to communicate the other vehicle
so very fast mobility level is required. VANET required less execution
time.
 Non- repudiation: In this procedure node cannot refuse but does not
send the messages and signals.
 Data verification and privacy: To preserve the integrity, regular bases
check the verification and privacy is very essential characteristic in
VANET.
The Security issues in VANET are given below:-
 National Regulations: UAV is used many application areas in
FANET. Many countries 'present the air regulation does not allow
restricted UAV operations in civil airspace.
 Routing: Data routing between UAC major challenges the
routing conventions should be able to update routing tables
animatedly conferring to topology changes, so must require to
develop new routing algorithms and networking modals for
assemble the flexible Modal.
 Path Planning: Path planning is play very vital role in FANET so;
acquire new algorithms methods and dynamic path planning is
very essential to achieve the goals. Many case each UAV has to
change its preceding path, and new ones must be recalculated
animatedly.
The Security challenges in VANET are given below:-
 Routing: In FANET routing is diverse from the other ad hoc network
because the node movement is very high and the topology modify very
frequently two major challenges are to be shown in routing:
 Routing algorithm work high mobility
 Routing algorithm should be quick to update
 Security: In FANET mange the secure routing point is: Make sure
Confidentiality, Integrity and Availability of precious information in
FANET so these networks are essential to mange. Lack of physical
security node compromises there is another issue in FANET. Trust
management is another important point. In FANET nodes leave and
join very frequently. Accessibility routing algorithms for ad-hoc
networks are unable in the opposition to frequent network topology
modify and malicious attacks in FANET.
 Quality of Service (QOS): The parameters quality of services able is to
be improved. In FANET different type of data are transformed like
image, video, audios, text.
Table 1. Comparison different types of ad-hoc networks [5]
 The applications are core component of ad hoc network and
basic purpose of these applications to serve the users.
 The behavior of the nodes in MANET, VANET and FANET are
dynamic nature due to different types of topology and network
nature.
 In this slide, emphasis various security issues in MANET, VANET
and FANET and also discuss in detail the key security challenges
in the field of MANET, VANET and FANET.
 In future work, we will discuss in detail the security solution of
security issues and challenges in MANET, VANET and FANET.
1. R. Nandakumar K. Nirmala “Security Challenges inMobile Ad Hoc Networks - A
Survey” Australian Journal of Basic and Applied Sciences, Vol. 10(1), pp. 654-
659,January 2016.
2. S. Banu Priya1, C.Theebendra2 “A Study on securitychallenges in mobile ad
hoc network” International journal of research in computer applications and
robotics, ISSN2320-7345 February 2016.
3. [3] N. Siddiqui, M. Shahid Husain, and M. Akbar “Analysis of security
challenges in vehicular adhoc network,” in Proc. Department of Computer
Science & Engineering, Integral University, Lucknow, India ACEIT, 2016.
4. Khuldeep Kumar,Sandeep Kumar Arrora “Review ofVehicles Ad HocNetwork
Security” International Journal of Grid and Distributed Computing Vol. 9, No.
11 (2016).
5. Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016,September). Performance
Analysis of Vehicular Adhoc Network Using Different Highway Traffic
Scenarios inCloud Computing. In International Conference on Future
Intelligent Vehicular Technologies (pp. 157-166).Springer.
 This is journal research paper and complete
research paper is available on research gate.
19
20

More Related Content

What's hot

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc networkAman Saurabh
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network Binayakreddy
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocolsAbhishek Kesharwani
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 

What's hot (20)

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
~Ns2~
~Ns2~~Ns2~
~Ns2~
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 

Similar to Security issues and challenges in MANET,VANET and FANET: A Survey

SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approachcsandit
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETIJNSA Journal
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksIRJET Journal
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & maneteSAT Journals
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationIJERA Editor
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET Journal
 

Similar to Security issues and challenges in MANET,VANET and FANET: A Survey (20)

SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANETSECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
SECURITY CHALLENGES, ISSUES AND THEIR SOLUTIONS FOR VANET
 
Review Paper on VANET
Review Paper on VANETReview Paper on VANET
Review Paper on VANET
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolVANET Security against Sybil Attack by Using New SRAN Routing Protocol
VANET Security against Sybil Attack by Using New SRAN Routing Protocol
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
 
Overview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security AttacksOverview of VANET with Its Features and Security Attacks
Overview of VANET with Its Features and Security Attacks
 
Review of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manetReview of authentication techniques for wireless networks & manet
Review of authentication techniques for wireless networks & manet
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
F0332838
F0332838F0332838
F0332838
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving NavigationSurvey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...Security schemes based on conditional privacy-preserving vehicular ad hoc net...
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANETIRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
 

More from Dr.Irshad Ahmed Sumra

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETDr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Dr.Irshad Ahmed Sumra
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANETDr.Irshad Ahmed Sumra
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETDr.Irshad Ahmed Sumra
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...Dr.Irshad Ahmed Sumra
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Dr.Irshad Ahmed Sumra
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Dr.Irshad Ahmed Sumra
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETDr.Irshad Ahmed Sumra
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemDr.Irshad Ahmed Sumra
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationDr.Irshad Ahmed Sumra
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsDr.Irshad Ahmed Sumra
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement Dr.Irshad Ahmed Sumra
 

More from Dr.Irshad Ahmed Sumra (20)

Using the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANETUsing the grades mechanism to differentiate the users in VANET
Using the grades mechanism to differentiate the users in VANET
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Trust and Trusted Computing in VANET
Trust and Trusted Computing in VANETTrust and Trusted Computing in VANET
Trust and Trusted Computing in VANET
 
Trusted Computing in VANET
Trusted Computing in VANETTrusted Computing in VANET
Trusted Computing in VANET
 
Comparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANETComparative study of security hardware modules in VANET
Comparative study of security hardware modules in VANET
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
 
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
Attacks on Security Goals (Confidentiality, Integrity, Availability) in VANET...
 
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
Effects of Attackers and Attacks on Availability Requirement in Vehicular Net...
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANETUsing tpm to ensure Security,Trust and Privacy (STP) in VANET
Using tpm to ensure Security,Trust and Privacy (STP) in VANET
 
VANET Security Research and Development Ecosystem
VANET Security Research and Development EcosystemVANET Security Research and Development Ecosystem
VANET Security Research and Development Ecosystem
 
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular CommunicationBehavior of Attacker and Some New Possible Attacks in Vehicular Communication
Behavior of Attacker and Some New Possible Attacks in Vehicular Communication
 
Timing Attack in Vehicular Network
Timing Attack in Vehicular NetworkTiming Attack in Vehicular Network
Timing Attack in Vehicular Network
 
Classes of Attacks in VANET
Classes of Attacks in VANETClasses of Attacks in VANET
Classes of Attacks in VANET
 
User Requirements Model for VANET Applications
User Requirements Model for VANET ApplicationsUser Requirements Model for VANET Applications
User Requirements Model for VANET Applications
 
VANET Applications and User Requirement
VANET Applications and User Requirement VANET Applications and User Requirement
VANET Applications and User Requirement
 
VANET Security and Trust
VANET Security and TrustVANET Security and Trust
VANET Security and Trust
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Security issues and challenges in MANET,VANET and FANET: A Survey

  • 1. Security issues and Challenges in MANET-VANET-FANET: A Survey
  • 2.  Security is one of the key important factors in ad hoc network due to the open wireless medium and dynamic topology of the network.  MANET, VANET and FANET are type of ad hoc network and their applications are served the end users in real environment. VANET and FANET are next generation network and due to safety applications more attractions for end users in these networks.  It will provide the survey on security issues and challenges in the field of MANET, VANET and FANET. The successful implementation of these networks in real environment, it is require the network will be secure and end user can take benefit from their life safety applications. 2
  • 3.  Vehicular ad-hoc network is a special kind of network in which nodes (Vehicles) can communicate with each other on the road and with its Infrastructure. 3 V2I
  • 4.  Safety Applications  Non Safety Applications Work in Progress Plz! use Alt. route Work Zone Warning:!!! Work Zone Warning:!!! Shopping MALL Parking Slot Available!!! RSU Parking Slot Available!!! 4
  • 5.  Security and privacy pay an important role to make the VANET superstitions, popular and unique all the transportation system.  For this purpose identify the some security requirement to fulfill the privacy needs and provide secure wireless communication between the two vehicles.  Every communication model has a special set of security requirements.  Identification  Authentication  Element authentication  Privacy conservation  Non- repudiation  Confidentiality  Availability  Trust
  • 6.
  • 7.  Mobile ad-hoc network (MANET) is a collection of wireless nodes that are interconnected each other and dynamically setup anyplace or anytime exclusive of having the pre-existence transportation.  There are two variations mobile network: infrastructure and substructure small network. In the case of Infrastructure network mobile communicate through the base station that are connected to fixed infrastructure and the infrastructure of less networks is known as the mobile ad- hoc networks.  Mobile ad-hoc network correspond to the composite distributed system MANET requisite exceptionally flexible technology without any fixed base station. Figure 1. Architecture of Mobile ad-hoc Network (MANET) [1]
  • 8.  VANET is a basically development system that increase the traffic safety and reduce the road accidents. VANET is a wireless technology that moves the car through the nodes and transfers the messages one node to another node.  Node are communicating single hop multi hop and also provide the huge range of network to capture the signals and send the messages. Defiantly, VANET technology enhances the security and traffic transportation. Vehicular communication is involved of the nearby vehicles and the appropriate design of VANET to provide the better safety driving. Figure 2. Architecture of Vehicular ad-hoc network (VANET) [2]
  • 9.  Rapid technology advances on electronic device and communication technologies, it has been probable to construct unmanned aerial vehicle (UAV) system, which can fly separately or can be manage slightly.  FANET especially case of MANET attribute and the high degree mobility. The FANET topology change more frequently, when the ordinary infrastructure is out of service or not available. The major essential component routing in FANET bandwidth play the critical role in the process of large amount of data routing decision. Figure 3. Architecture of Flying ad-hoc network (FANET) [4]
  • 10. Figure 4. Architecture of MANET, VANET and FANET [5]
  • 11.  The Security issues and challenges in MANET are given below:-  Active Attacks: Active Attack achieves the attacker for duplicate; transform and removal of exchange also try to modify the behavior of protocol. Number of times identify the active attack however active attack fewer used by an attacker. Basically active attack modifies the data packets, inject the packet and drop the packet.  Passive Attacks: Passive attack is difficult to be identifying. Routing packet and attacker may understand about a node. Passive attack objective the privacy characteristic of network and complete for distinguish the communication prototype among nodes.
  • 12.  The Security issues in VANET are given below:-  Threats to Availability  The threats to availability of vehicle-to-vehicle and vehicle-to- roadside communication are given below:  1)Denial of Service Attack: Denial service attack can be complete with approve of indoor and out door network. In the cause of VANET produce the artificial messages like Flooding and Jamming.  2)Broadcast Tampering: This attack is supported out by an insider. It contributes false safety messages into the VANET to impose damage or detriment to the road users. When attackers influence the traffic on a clear route then accident can happen.  3)Malware: This attack is frequently approved by insiders more than outsiders and when a firm ware update is done it can be downloaded into the system.
  • 13. The Security challenges in VANET are given below:-  Real Time Constraints: VANET achieve the real time constraints so, required the specific timing to deliver the massages. Achieve this goal use very fast cryptographic algorithm.  Data consistency Liability: Data consistency is important in VANET and avoids the unnecessary information because authenticate node execute the malicious.  Key Distribution: VANET use the key to send and receive the messages encrypts the message and after procedure complete decrypt the message that’s why key distribution is an important procedure and perform the major challenge.  High mobility: High mobility is required in VANET nodes are connected each other’s and transfer the signals to communicate the other vehicle so very fast mobility level is required. VANET required less execution time.  Non- repudiation: In this procedure node cannot refuse but does not send the messages and signals.  Data verification and privacy: To preserve the integrity, regular bases check the verification and privacy is very essential characteristic in VANET.
  • 14. The Security issues in VANET are given below:-  National Regulations: UAV is used many application areas in FANET. Many countries 'present the air regulation does not allow restricted UAV operations in civil airspace.  Routing: Data routing between UAC major challenges the routing conventions should be able to update routing tables animatedly conferring to topology changes, so must require to develop new routing algorithms and networking modals for assemble the flexible Modal.  Path Planning: Path planning is play very vital role in FANET so; acquire new algorithms methods and dynamic path planning is very essential to achieve the goals. Many case each UAV has to change its preceding path, and new ones must be recalculated animatedly.
  • 15. The Security challenges in VANET are given below:-  Routing: In FANET routing is diverse from the other ad hoc network because the node movement is very high and the topology modify very frequently two major challenges are to be shown in routing:  Routing algorithm work high mobility  Routing algorithm should be quick to update  Security: In FANET mange the secure routing point is: Make sure Confidentiality, Integrity and Availability of precious information in FANET so these networks are essential to mange. Lack of physical security node compromises there is another issue in FANET. Trust management is another important point. In FANET nodes leave and join very frequently. Accessibility routing algorithms for ad-hoc networks are unable in the opposition to frequent network topology modify and malicious attacks in FANET.  Quality of Service (QOS): The parameters quality of services able is to be improved. In FANET different type of data are transformed like image, video, audios, text.
  • 16. Table 1. Comparison different types of ad-hoc networks [5]
  • 17.  The applications are core component of ad hoc network and basic purpose of these applications to serve the users.  The behavior of the nodes in MANET, VANET and FANET are dynamic nature due to different types of topology and network nature.  In this slide, emphasis various security issues in MANET, VANET and FANET and also discuss in detail the key security challenges in the field of MANET, VANET and FANET.  In future work, we will discuss in detail the security solution of security issues and challenges in MANET, VANET and FANET.
  • 18. 1. R. Nandakumar K. Nirmala “Security Challenges inMobile Ad Hoc Networks - A Survey” Australian Journal of Basic and Applied Sciences, Vol. 10(1), pp. 654- 659,January 2016. 2. S. Banu Priya1, C.Theebendra2 “A Study on securitychallenges in mobile ad hoc network” International journal of research in computer applications and robotics, ISSN2320-7345 February 2016. 3. [3] N. Siddiqui, M. Shahid Husain, and M. Akbar “Analysis of security challenges in vehicular adhoc network,” in Proc. Department of Computer Science & Engineering, Integral University, Lucknow, India ACEIT, 2016. 4. Khuldeep Kumar,Sandeep Kumar Arrora “Review ofVehicles Ad HocNetwork Security” International Journal of Grid and Distributed Computing Vol. 9, No. 11 (2016). 5. Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016,September). Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios inCloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166).Springer.
  • 19.  This is journal research paper and complete research paper is available on research gate. 19
  • 20. 20