A Survey on Protocols & Attacks in MANET Routing
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols.
Authors and Affiliations
Rishabh Jain , Charul Dewan , Meenakshi
REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not...
Improving the Performance of Servers by Implementing the Manual Log Shipping for Large Databases
Business success, the need to ensure 24x7availability is greater than it has ever been. One common method for as database systems become more and more critical to providing 99.99%, or "4-nines" availability, is to implem...
Performance Evaluation of Association Rule Mining Algorithms using Horizontal and Vertical Data Layouts
Data mining is used to discover interesting and previously unknown atterns from datasets. Association rule mining is a popular and well researched method of data mining for discovering interesting relations between items...
Plagiarism: Problem, Behaviour and Reduction
Plagiarism has been troubling academic world since long. With the invention of electronic resources like internet in recent times, it has become easier and more accessible for students than ever before. Practice of plagi...
OPTIMISATION OF CHANNEL SHARING STRATEGIES IN HIERACHICAL CELLULAR SYSTEMS USING QUEUING
The primary goal of future cellular mobile communication networks is to provide efficient and cost effective services to mobile users under all environments. The major issues that affects the quality of service and perf...