Sohaib Ahmad, Faheem Khan, Mukhtar Ahmad , Shazia Naeem, M.N .Khalid and Asia Begum
Islamia College University Peshawar, KPK Pakistan.
Gandahara University Peshawar, KPK Pakistan
Article Received on :
Article Accepted on :
Article Published :
In general, Security techniques pursue two defense lines: one preventive and the second
one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and
cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as
Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to
facilitate network s to complete their functions properly and significantly even In the presence of
Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established
Survivability concepts and its association with preventive, reactive and Tolerance defense lines.
Survivable MANETs will be capable to accomplish their purposes and aims by means of the
cooperation between those three defense lines. Key Properties of Survivability as resistance,
acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs
were examined. In conclusion, this function highlights that a completely Survivable MANET be
supposed to be appropriate cooperatively the three defense lines as an alternative of only one or
two lines separately.
Copy the following to cite this article: Ahmad S, Khan F, Ahmad M, Naeem S, Khalid M. N, Begum A. A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability. Orient. J. Comp. Sci. and Technol;6(1) |
Copy the following to cite this URL: Ahmad S, Khan F, Ahmad M, Naeem S, Khalid M. N, Begum A. A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability. Orient. J. Comp. Sci. and Technol;6(1). Available from: http://www.computerscijournal.org/?p=2685 |