A Review On Wireless Adhoc Network Security

Abstract

Emergence of wireless networks in 21th has redefined the networks which were seen in previous century. Initially there were no system networks so they were all secure .The data kept in a standalone system was totally safe, except an attacker gets the right to access the particular system. As there was a need occurred to connect to other systems, the complexity increased and the data kept in a system got more vulnerable because to transfer it from one system there was a need of some cable medium the data got some threat from outsiders because they got some more space to do their hacking task. They can now manipulate the data passing through a medium, also they could try to remove data from the channel, or they can mislead others with wrong information. But the whole 20th century was more peaceful then of now because of comparatively less systems connected as of now. In this century, in fact, from the last decade of 20 century, the systems grew rapidly due to the popularity of internet, and growing need of the people to transfer data from one system to another, now this is the age of mobilization and every person needs information on his hands instantly. People need networking with mobility, which has given growth to wireless systems so that they can enjoy while moving and the mobility doesn’t disrupt the networking benefits. This has led to the growth to wireless systems; almost half of the world’s systems are now wirelessly connected to each other as our laptops, wireless enabled desktops, mobile phones, sensor nodes etc. Facilities have grown immensely but also there is an increase in threat level; now an attacker has more points to intrude our information, everything is less secure than before. So there is a need to check the security features of our networks and an enhancement to them so that they are more secure to any attack. In this paper we try to bring the attack types and some prevention to save us from any attack.

Authors and Affiliations

Manoj Kumar Joshi

Keywords

Related Articles

REMOTE ANDROID

Now a days phones are used world wide and provide many applications which were earlier provided only by desktops or laptops. These smart phones have brought a big change in the technical field. The most popular design...

 APRAISAL OF DEMOLISHED CONCRETE COARSE AND FINES FOR STABILIZATION OF CLAYEY SOIL

 Road pavements or structure on loose soil needs stabilization. Soil stabilization is mainly done for modifying soil engineering properties to improve the bearing capacity and durability property of weak soil....

 Human Character Recognition by Handwriting using Fuzzy Logic

 Handwritten characters recognition is one of the most challenging & burning topic in the field of image processing & pattern recognition. The most prominent problem in handwriting recognition is the vast v...

 Routing & Energy Conservation Protocols in WSN- A Review

 The most important task of a sensor base station. One simple approach to the complete this task is direct data transmission. In this case, each node in the network directly sends sensing data to the base station....

IMPACT OF IMAGE SEGMENTATION APPROACHES ON NOISY AND BLURRED IMAGES

In today’s world, many applications are used for image processing. Segmentation is one of the main steps used for image processing. Segmentation is used to identify objects in an image. It divides an image into multiple...

Download PDF file
  • EP ID EP138219
  • DOI -
  • Views 59
  • Downloads 0

How To Cite

Manoj Kumar Joshi (30). A Review On Wireless Adhoc Network Security. International Journal of Engineering Sciences & Research Technology, 2(6), 1632-1635. https://europub.co.uk/articles/-A-138219