A comparative study of different security issues in MANET
Journal Title: International Journal of Experimental Research and Review - Year 2023, Vol 31, Issue 2
Abstract
In a MANET (Mobile Ad-Hoc Network), an intruder can attempt to gain unlawful access to the network to obtain sensitive information. These attacks can occur at various network layers, and different attacks can be carried out. To mitigate the risks of such attacks, several solutions have been proposed. It can be characterized by dynamic topology, meaning that the network is formed by a group of nodes communicating wirelessly and without centralized control. This feature makes MANETs highly vulnerable to attacks, especially when malicious nodes are introduced into the network. These malicious nodes can engage in malicious activity that severely damages the network's performance and credibility. Among the major attacks that can be carried out in a MANET are Sinkhole attacks, Black hole attacks, and Wormhole attacks. Sinkhole attack, a malicious node intercepts a data packet, alters its contents, and then forwards it to its neighbors. This can cause other nodes to send their data packet to the malicious nodes, compromising the safety and privacy of the network. In a BHA, malicious nodes drop the data packet it receives, preventing them from accomplishing their intended destinations. This can result in a DoS attack, where legitimate users cannot access the network. A WHA involves two malicious nodes colluding to drop data packets from the network. They create a virtual tunnel between them, and any data that passes through this tunnel is dropped, making it impossible for legitimate nodes to communicate with each other. All these attacks can cause significant damage to the network, and researchers have proposed various solutions to protect the network from them. These solutions include using IDS, deploying secure routing protocols, and developing secure algorithms for data transmission. By implementing these solutions, it is possible to improve the Safety and trustworthiness of the MANET and prevent malicious nodes from causing harm to the network.
Authors and Affiliations
Ankita Kumari, Sandip Dutta, Soubhik Chakraborty
Analytical Method Development and Validation of RP-HPLC Method for Estimation of Pazopanib Drug Sample and It’s Dosage Form
The study focuses on developing and verifying a cost-effective Reverse Phase High-Performance Liquid Chromatography (RP-HPLC) technique for quantifying Pazopanib HCl in both bulk and tablet forms. The study aims to devel...
Nutritional status and effect of physical activity on anthropmetric characteristics of Bengalee Muslim adolescents boys of North 24 Parganas, West Bengal, India
A cross-sectional study of 522 Bengalee Muslim boys aged 10-17 years of Deganga, North 24 Parganas, West Bengal, India, was undertaken to study their age differences in nutritional status and effect of physical activity...
Evaluating biochemical and pharmacological properties of Curcuma longa L. grown organically in two locations of Odisha, India: In vitro study
Organic farmers use nitrogen-fixing cover crops, herbicides, and biological fertilizers derived chiefly from animal and plant wastes. Curcumin levels are higher in this turmeric variety than in other types with differing...
Diagnosing and categorizing of pulmonary diseases using Deep learning conventional Neural network
Lung cancer is one of the major illnesses that contribute to millions of fatalities worldwide. Numerous deaths could be saved through the early identification and categorization of lung cancers. However, with traditional...
A Proactive Approach to Fault Tolerance Using Predictive Machine Learning Models in Distributed Systems
In the era of cloud computing and large-scale distributed systems, ensuring uninterrupted service and operational reliability is crucial. Conventional fault tolerance techniques usually take a reactive approach, addressi...