International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 328

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.8 / 10


     

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh


Abstract: Security is a major concern for safe communication between mobile nodes in an alien environment. In alien environments; attackers can bunch active and passive attacks against imperceptible routing in routing message and data packets. In this; we focus on significant security attacks in Mobile ad hoc networks. MANET has no clear immunity so; it is available to both legitimate users and malicious attackers. In the existence of malicious nodes; one of the main objectives in MANET is to design the robust security solution that can protect MANET from various routing attacks. However; these solutions are not correct for MANET resource constraints; i. e. ; battery power and limited bandwidth. Mobile ad-hoc network can operate in isolation or in coordination with a wired infrastructure. This flexibility along with their self organizing facilities is some of MANET's biggest strengths; as well as their biggest security vulnerabilities. In this paper different routing attacks; such as active (black hole; spoofing; wormhole; flooding;) and passive (traffic monitoring; traffic analysis; eavesdropping) are described.


Keywords: MANET, DOS, AODV, Data Traffic, Attacks, Security


Edition: Volume 3 Issue 5, May 2014


Pages: 1295 - 1299



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Amandeep Kaur, Dr. Amardeep Singh, "A Review on Security Attacks in Mobile Ad-hoc Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 5, May 2014, pp. 1295-1299, https://www.ijsr.net/getabstract.php?paperid=20132026, DOI: https://www.doi.org/10.21275/20132026



Similar Articles

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 2571 - 2575

Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation

Harish Narne

Share this Article

Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 1755 - 1759

Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack

Jaspreet Kaur, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Downloads: 75

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patients DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article
Top