A Review on Impersonation Attack in Mobile Ad-Hoc Network

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.

Authors and Affiliations

Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar

Keywords

Related Articles

Object Deployment Using Data Trans-Reception in Military Applications

An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed b...

Harmony Search Optimization in K-Means Clustering

Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...

Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks

While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the n...

Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility

Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...

Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm

This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-m...

Download PDF file
  • EP ID EP157669
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar (2014). A Review on Impersonation Attack in Mobile Ad-Hoc Network. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 34-37. https://europub.co.uk/articles/-A-157669