A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network

Abstract

A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a router. The security issue is the main problem of MANET, because many nodes perform many kind of misbehavior. This misbehavior looks like selfishness. We can define the selfishness as, a node use the recourse of other node and preserve the resource of own. This malicious node creates the problem in MANET. In this paper, we define the attacks in MANET.

Authors and Affiliations

Satyam Shrivastava , Sonali Jain

Keywords

Related Articles

Security against attacks in TOR networks

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...

EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES

Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...

BLOCKING ARTIFACT DETECTION METHOD FOR HIGHLY COMPRESSED IMAGES

Blocking artifacts severely reduce the visual quality of the image making it unpleasant to the viewer. Reduction of blocking artifacts is essential to render the compressed image or video acceptable to the human viewer....

A REVIEW: Advancement in Single node data transfer energy protocol in WSN

Wireless sensor network (WSNs) gains the importance in both research and actual user. Energy saving is the major issue that is common in both. Now day maximum work in research field on the multiple hops data transmission...

Rules Reduction Using Decision Matrix

The rules are the prescribed standards on the basis of which decisions are made for specific purpose. The rule is a statement that establishes a principle or standard, and serves as a norm for guiding or mandating action...

Download PDF file
  • EP ID EP93232
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Satyam Shrivastava, Sonali Jain (2013). A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network. International Journal of Computer Science & Engineering Technology, 4(3), 218-222. https://europub.co.uk/articles/-A-93232