A Survey on Protocols & Attacks in MANET Routing
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols.
Authors and Affiliations
Rishabh Jain , Charul Dewan , Meenakshi
Awareness of Open Source Software (OSS): Promises, Reality and Future
Open source is a development method for software that harnesses the power of distributed peer review and transparency of process. The Open Source Initiative Approved License trademark and program creates a nexus of trus...
SECURITY THREATS IN WIRELESS SENSOR NETWORKS
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless...
Statistical Analysis of Two Types Failure of Redundant System
In this paper we have analyzed a two unit stand by system in which the operative unit fails due to machinery defects as well as random shocks which occurs at random epochs of time.
ENHANCING ORGANIZATIONAL EFFECTIVENESS THROUGH CUSTOMER ENGAGEMENT
Customer satisfaction is “merely the entry point for achieving a deeper foundation that rests on total customer engagement,” by Benson Smith and Tony Rutigliano. Everyone aims to satisfy the customers: in fact, you and y...
A Swarm Based Approach to Detect Hole In Wireless Sensor Network
A Sensor network is a network with large number of sensors in it. The broadcasting and the multicasting are the major communication approaches used in such network to distribute some information over the network or...