How do the security issues vary from MANETs versus sensor networks versus WiMax versus WMNs? Explain clearly.

What will be an ideal response?


The basic issue is what kind of resources available to different wireless technologies. Typically, in both WiMAX and WMN, the BS or the routers are connected to A/C power and availability of energy is not an issue. However, both MANETs and sensor networks have their wireless device running on batteries and have limited energy. Therefore, attempts are made to conserve energy for wireless devices used for MANETs and sensor networks. This also affects the security scheme used in these networks. Besides, there is a central station controlling access in WiMAX (BS) and WMN (IGW); while there is no central authority in a MANET or a WSN. It may be noted that the BS or sink node in a WSN can have some control on sensing and radio transmission schedule by broadcasting control packets periodically to all the sensors by the BS. But, so far as operation is concerned, each sensor is pretty much independent and works more or less like a distributed system. In addition, locations of devices in a MANET and sensor networks, can be determined after deployment and locations of wireless devices can’t be pre-planned. In other word, it is rather impossible to say which wireless devices will be each other’s neighbors. This makes security issue much more complex in MANETs and Sensor networks. As the first thing each wireless device has to do is to authenticate its neighbors and is a very time and resource consuming process. Then other things like authorization, encryption, and protection against different types of attacks ought to be considered. It may also be noted that the data sent by sensors may not be that critical if that is compromised.

So, security of basic data may not be that important, unless it represents some aggregated value or an appropriate consolidation of information. So far as the MANET is concerned, it may depend on the situation and the application being processed. In general, the information may be of general use, unless used for 149 ©2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. some specific defense application. Therefore, the rule of thumb is the WiMAX and WMNs do follow a central control and it is rather easier to incorporate any degree of desirable security; while it is rather difficult to implement simple security mechanisms in MANETs and sensor networks.

Trades & Technology

You might also like to view...

The use of large dams and reservoirs to generate electricity is known as ____

a. pumped storage c. impoundment hydropower b. in-stream hydropower d. diversion hydropower

Trades & Technology

Explain what a photobioreactor is and how it works

What will be an ideal response?

Trades & Technology

Which of the following expresses flow rate in a hydraulic circuit?

A. feet per second (fps) B. gallons per minute (gpm) C. feet head D. all of the above

Trades & Technology

A gear with 24 teeth and running at 120 rpm is being driven by a gear turning at 360 rpm.  How many teeth does the driving gear have?

What will be an ideal response?

Trades & Technology