Downloads: 109 | Views: 328
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014 | Popularity: 6.8 / 10
A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Abstract: Security is a major concern for safe communication between mobile nodes in an alien environment. In alien environments; attackers can bunch active and passive attacks against imperceptible routing in routing message and data packets. In this; we focus on significant security attacks in Mobile ad hoc networks. MANET has no clear immunity so; it is available to both legitimate users and malicious attackers. In the existence of malicious nodes; one of the main objectives in MANET is to design the robust security solution that can protect MANET from various routing attacks. However; these solutions are not correct for MANET resource constraints; i. e. ; battery power and limited bandwidth. Mobile ad-hoc network can operate in isolation or in coordination with a wired infrastructure. This flexibility along with their self organizing facilities is some of MANET's biggest strengths; as well as their biggest security vulnerabilities. In this paper different routing attacks; such as active (black hole; spoofing; wormhole; flooding;) and passive (traffic monitoring; traffic analysis; eavesdropping) are described.
Keywords: MANET, DOS, AODV, Data Traffic, Attacks, Security
Edition: Volume 3 Issue 5, May 2014
Pages: 1295 - 1299
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 5 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024
Pages: 1755 - 1759Enhancement in Homomorphic Encryption Scheme of Cloud Computing to Isolate DOS Attack
Jaspreet Kaur, Dr. Gurjit Singh Bhathal
Downloads: 42 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Downloads: 65
Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021
Pages: 1165 - 1168A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features
Chengcheng Yan, Yanping Hu
Downloads: 75
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1936 - 1938A Mining Method to Predict Patients DOSH
Ruchi Rathor, Pankaj Agarkar