A Review on Security Attacks in Mobile Ad-hoc Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 168 , Downloads: 106 | CTR: 63 % | Weekly Popularity: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Security is a major concern for safe communication between mobile nodes in an alien environment. In alien environments; attackers can bunch active and passive attacks against imperceptible routing in routing message and data packets. In this; we focus on significant security attacks in Mobile ad hoc networks. MANET has no clear immunity so; it is available to both legitimate users and malicious attackers. In the existence of malicious nodes; one of the main objectives in MANET is to design the robust security solution that can protect MANET from various routing attacks. However; these solutions are not correct for MANET resource constraints; i.e.; battery power and limited bandwidth. Mobile ad-hoc network can operate in isolation or in coordination with a wired infrastructure. This flexibility along with their self organizing facilities is some of MANET's biggest strengths; as well as their biggest security vulnerabilities. In this paper different routing attacks; such as active (black hole; spoofing; wormhole; flooding;) and passive (traffic monitoring; traffic analysis; eavesdropping) are described.

Keywords: MANET, DOS, AODV, Data Traffic, Attacks, Security

Edition: Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

Share this Article

How to Cite this Article?

Amandeep Kaur, Dr. Amardeep Singh, "A Review on Security Attacks in Mobile Ad-hoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20132026, Volume 3 Issue 5, May 2014, 1295 - 1299

168 PDF Views | 106 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 147 , Downloads: 84 | CTR: 57 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'DOS'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 81 , Downloads: 63 | CTR: 78 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Views: 133 , Downloads: 73 | CTR: 55 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Views: 134 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Views: 139 , Downloads: 99 | CTR: 71 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Similar Articles with Keyword 'AODV'

Views: 143 , Downloads: 78 | CTR: 55 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Views: 145 , Downloads: 102 | CTR: 70 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Views: 134 , Downloads: 104 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Similar Articles with Keyword 'Data Traffic'

Views: 168 , Downloads: 106 | CTR: 63 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Views: 171 , Downloads: 110 | CTR: 64 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2157 - 2160

Study of Packet Delivery Ratio, Collision Detection Ratio, End To End Delay during Mobility in Various Wireless Techniques Using NS2

Anju Sangwan, Harish Bedi

Share this Article

Views: 159 , Downloads: 112 | CTR: 70 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2462 - 2466

Load Balancing By Max-Min Algorithm in Private Cloud Environment

S M S Suntharam

Share this Article

Views: 146 , Downloads: 114 | CTR: 78 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2533 - 2535

Overview on Effective Controlling Via Store-Carry and Forward Scheme in Mobile Communication

Anusha Varghese, Dr. K Deeba

Share this Article

Views: 140 , Downloads: 120 | CTR: 86 %

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 164 - 167

A Probabilistic Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-Hoc Network

Arpita Rathod, Prof. Shreya Patel

Share this Article

Similar Articles with Keyword 'Attacks'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 158 , Downloads: 89 | CTR: 56 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 124 , Downloads: 98 | CTR: 79 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this Article

Similar Articles with Keyword 'Security'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 165 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top