A Review On Wireless Adhoc Network Security

Abstract

Emergence of wireless networks in 21th has redefined the networks which were seen in previous century. Initially there were no system networks so they were all secure .The data kept in a standalone system was totally safe, except an attacker gets the right to access the particular system. As there was a need occurred to connect to other systems, the complexity increased and the data kept in a system got more vulnerable because to transfer it from one system there was a need of some cable medium the data got some threat from outsiders because they got some more space to do their hacking task. They can now manipulate the data passing through a medium, also they could try to remove data from the channel, or they can mislead others with wrong information. But the whole 20th century was more peaceful then of now because of comparatively less systems connected as of now. In this century, in fact, from the last decade of 20 century, the systems grew rapidly due to the popularity of internet, and growing need of the people to transfer data from one system to another, now this is the age of mobilization and every person needs information on his hands instantly. People need networking with mobility, which has given growth to wireless systems so that they can enjoy while moving and the mobility doesn’t disrupt the networking benefits. This has led to the growth to wireless systems; almost half of the world’s systems are now wirelessly connected to each other as our laptops, wireless enabled desktops, mobile phones, sensor nodes etc. Facilities have grown immensely but also there is an increase in threat level; now an attacker has more points to intrude our information, everything is less secure than before. So there is a need to check the security features of our networks and an enhancement to them so that they are more secure to any attack. In this paper we try to bring the attack types and some prevention to save us from any attack.

Authors and Affiliations

Manoj Kumar Joshi

Keywords

Related Articles

 SORTIE SORTING

 Almost all computers regularly sort data. Many different sorting algorithms have been proposed. It is known that no sort algorithm based on key comparisons can sort N keys in less than O (N log N) operations and t...

 CYCLE TIME REDUCTION THROUGH MINIMIZATION OF TRANSPORTATION AT A PALLET MANUFACTURING COMPANY IN THE PHILIPPINES

 In the pursuit of profitability and competitiveness, more companies are turning to lean manufacturing to reduce or eliminate waste in their production processes. Cycle Time Reduction to increase productivity was t...

 Experimental and Mathematical Modelling for Methane Biogas Production from Mixing of Real Municipal Solid Waste and Sewage Sludge

 Biogas (methane) production from batch anaerobic digesters containing varying ratio of organic fraction municipal solid waste and sewage sludge, pH, temperature and total solid are studied for a period of 30 days....

 Finite Element Analysis of Truck Chassis

 Automotive chassis is an important part of an automobile. The chassis serves as a frame work for supporting the body and different parts of the automobile. Also, it should be rigid enough to withstand the shock,...

A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES

This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudora...

Download PDF file
  • EP ID EP138219
  • DOI -
  • Views 68
  • Downloads 0

How To Cite

Manoj Kumar Joshi (30). A Review On Wireless Adhoc Network Security. International Journal of Engineering Sciences & Research Technology, 2(6), 1632-1635. https://europub.co.uk/articles/-A-138219