A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network

Abstract

A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a router. The security issue is the main problem of MANET, because many nodes perform many kind of misbehavior. This misbehavior looks like selfishness. We can define the selfishness as, a node use the recourse of other node and preserve the resource of own. This malicious node creates the problem in MANET. In this paper, we define the attacks in MANET.

Authors and Affiliations

Satyam Shrivastava , Sonali Jain

Keywords

Related Articles

A Survey on Under Water Images Enhancement Techniques 

The Major causes for the underwater images are light scattering and color change. One of the methods of improving quality of the image is image enhancement. This paper presents a comparative study of various image enhanc...

Reinforcement Learning based Routing Protocols in WSNs: A Survey

Advances in the technology along with reduction in processor size, its memory, and wireless antenna size has facilitated the construction of low cost, low powered and multifunctional Sensor nodes which in turn led to hig...

Analyze the impact of Transmission rate on the Performance of AODV and DSR Protocols in MANETs under Responsive and Non-responsive Traffic.

The massive boom in the wireless technology has led to heavy utilization. Due to the heavy utilization and shared nature of resources causes QoS problems in ad hoc networks. Providing QoS is a severe problem in mobile ad...

Detect and prevent HELLO FLOOD Attack using Centralized technique in WSN

In wireless sensor networks, wirelessly nodes communicate with each other. WSN is a very large array of diverse sensor nodes that are interconnected by a communication network . The battery lifetime of nodes in wireless...

A Novel Color Image Segmentation Approach Based On K-Means Clustering with Proper Determination of the Number of Clusters and Suitable Distance Metric

K-Means algorithm is the most commonly chosen technique for color image segmentation task. Although this algorithm is famous for its low complexity and easy implementation, but usually it is seen that the segmentation r...

Download PDF file
  • EP ID EP93232
  • DOI -
  • Views 145
  • Downloads 0

How To Cite

Satyam Shrivastava, Sonali Jain (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology, 4(3), 218-222. https://europub.co.uk/articles/-A-93232