Security Threats in MANETS
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for many applications such as rescue and tactical operation. due to the flexibility provided by the dynamic infrastructure. Security in mobile adhoc network is quite challenging as there is no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside and outside the network. Further many security solution used for wired networks are ineffective and inefficient for the highly dynamic and resource constrained environments where Manet use might be expected. So we consider most common types of attacks on mobile ad hoc network and on access point through which MANET is connected to the internet. Specifically we study how different attacks affect the performance of the network.
Authors and Affiliations
Ms Mamta Sachdeva, Aarti Sharma
Disease Detection of Cotton crop using Image Processing Technique: A Survey
Farming is important sector in India for human being, as near about 55-60% people are depends directly and indirectly on it. Among all crops, Cotton is main cash crop in India gives more income to the farmer. Due to dis...
Centralized Server Controlled Secure Packet Transmission in Military Network
The development of a novel wide-area centralized damping controller to improve the time consuming in presence of time-varying delay and packet dropout in the communication network. Two different strategies have been ado...
Advanced Annotation Creator for Search Results from Web Databases
A large portion of the deep web is database based, i.e., for many search engines, data encoded in the returned result pages come from the underlying structured data-bases. Such type of search engines is often referred a...
Efficient Monitoring Of Transportation Networks by Mobile Sensors
Morden day traffic management systems need to be sophisticated to handle the traffic issues efficiently. We have seen in the past till the recent days that fixed sensors were used to monitor the transportation network....
Generating Content Searchable Cipher Texts with Semantic Security
Many systems which uses various content distribution over the network requires access restriction, prevention from unauthorized access and hiding the identity of users. Current systems face problems there are some types...