Downloads: 109 | Views: 371
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.8 / 10
A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Abstract: Security is a major concern for safe communication between mobile nodes in an alien environment. In alien environments; attackers can bunch active and passive attacks against imperceptible routing in routing message and data packets. In this; we focus on significant security attacks in Mobile ad hoc networks. MANET has no clear immunity so; it is available to both legitimate users and malicious attackers. In the existence of malicious nodes; one of the main objectives in MANET is to design the robust security solution that can protect MANET from various routing attacks. However; these solutions are not correct for MANET resource constraints; i. e. ; battery power and limited bandwidth. Mobile ad-hoc network can operate in isolation or in coordination with a wired infrastructure. This flexibility along with their self organizing facilities is some of MANET's biggest strengths; as well as their biggest security vulnerabilities. In this paper different routing attacks; such as active (black hole; spoofing; wormhole; flooding;) and passive (traffic monitoring; traffic analysis; eavesdropping) are described.
Keywords: MANET, DOS, AODV, Data Traffic, Attacks, Security
Edition: Volume 3 Issue 5, May 2014
Pages: 1295 - 1299
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh