A Review on Impersonation Attack in Mobile Ad-Hoc Network

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.

Authors and Affiliations

Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar

Keywords

Related Articles

An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection

Privacy-sensitive audio features for speaker diarization in multiparty conversations: i.e., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone sc...

Aligning Cloud Computing Security with Business Strategy

These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...

An Effort Prediction Framework for Software Code Quality Measurement Based on Quantifiable Constructs for Object Oriented Design

As the Object Oriented Technology enters into software organizations, it has created new challenges for the companies which used only Product Metrics as a tool for monitoring, controlling and maintaining the software pro...

A Novel Mechanism for Secure and Efficient VANET Communication

A Vehicular Ad hoc NETwork (VANET) is a type of mobile Peer-To-Peer wireless network that allows providing communication among nearby vehicles and between vehicles and nearby fixed roadside equipment. The lack of central...

Software Platforms for Mobile Distributed Systems

As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...

Download PDF file
  • EP ID EP157669
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar (2014). A Review on Impersonation Attack in Mobile Ad-Hoc Network. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 34-37. https://europub.co.uk/articles/-A-157669