A Survey of Layer Specific and Cryptographic primitive attacks and their countermeasures in MANETS
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 4
Abstract
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. In MANET nodes which are within the range of each other can connect directly where as nodes which are not in the vicinity of each other rely on the intermediate node for communication. Each node in MANET can work as a sender, receiver as well as router. Communication in the network depends upon the trust on each other. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs).These attacks actually need some counter measures so that these attacks can be avoided. The hackers attacks are reduce the capacity and efficiency of network in MANET. In this paper we have studied how various layer specific attacks and cryptographic primitive attacks affects the performance of the network then we have also presented their countermeasures that can be taken to avoid them .
Authors and Affiliations
Sapna Boora1 , Sonia Ohri
Towards an Efficient Usage of UbiSOAP Middleware for Ubiquitous Networks
With the drastic evolution of wireless technologies, software services can become truly ubiquitous, being not solely accesses but also hosted by wirelessly networked portable gadgets. As a result, legacy applicatio...
A Study on Network Security Aspects and Attacking Methods
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...
Consistency Maintenance in Fractious P2P System
Truncate dispose-to-identically to cagoule networks are out of doors worn in come unattended alongside systems. P2P networks bed basically be dispassionate into match roughly types: combine is neat the twin-to-co...
Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor
This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The...
An Overview of Privacy and Security in SNS
The use of Social Networking web sites and applications is rising day by day, many users are not properly informed of the risks associated with using these sites and application. User should understand these risks...