A Review on Impersonation Attack in Mobile Ad-Hoc Network

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.

Authors and Affiliations

Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar

Keywords

Related Articles

A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...

Creation of Load Balanced Mail Server Management System Using Cloud Computing

This system facilitates mailing among the users of an internet, having an efficient and easy to communicate with telecommunications. The mails are transmitted and receiving by individual users registered in a mail manage...

Implementation of an Efficient RBAC Technique of Cloud Computing in .Net Environment

Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are...

Maximizing Network Capacity in MANETs through Cooperative Communications

Mobile Ad Hoc Networks are for many practical scenarios in the real world as it does not need any pre-established infrastructure. Nodes in the MANET are resource constrained. Communications over network consume energy re...

A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching For Video Retrieval

Recently, in the field of video analysis and retrieval Human action recognition in video is an important research and challenging topic. An efficient video retrieval is needed to search most similar and relevant video co...

Download PDF file
  • EP ID EP157669
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar (2014). A Review on Impersonation Attack in Mobile Ad-Hoc Network. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 34-37. https://europub.co.uk/articles/-A-157669