Security Threats in MANETS
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for many applications such as rescue and tactical operation. due to the flexibility provided by the dynamic infrastructure. Security in mobile adhoc network is quite challenging as there is no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside and outside the network. Further many security solution used for wired networks are ineffective and inefficient for the highly dynamic and resource constrained environments where Manet use might be expected. So we consider most common types of attacks on mobile ad hoc network and on access point through which MANET is connected to the internet. Specifically we study how different attacks affect the performance of the network.
Authors and Affiliations
Ms Mamta Sachdeva, Aarti Sharma
An Efficient Way of Classifying and Clustering Documents Based on SMTP
In text processing, the similarity measurement is the important process. It measures the similarities between the two documents. In this project we proposed the new similarity measurement. The computation of similarity...
Optimal Side Lobes Reduction of Linear Array Antenna Using Crow Search Algorithm
The aim of this paper is to introduce the novel metaheuristic crow search Optimization algorithm (CSA) to the electromagnetic and antenna community. Crow search algorithm is a population based method, mimicking the inte...
Navnath Dahifale, Sachin Kadam, Swapnil Sabale, Prof. Chandan Chaubey
This paper describes the RFID based automatic toll-tax collection system for toll gate. Most of the toll collection systems commonly used in India is manual transaction. Now a days, streams of traffic are increased and...
Survey of Cloud Security Techniques
Cloud storage is use to reduce the cost of storage in I.T fields and other benefits such as data accessibility through internet. Ensuring the security of cloud server is important so store sensitive data for example con...
Power Quality Improvement In Weak Grids With Three Phase Three Leg Active Power Conditioner
This paper presents a three phase three leg active power conditioner to improve power quality based on renewable energy. A micro-grid is a weak electrical grid, which can be easily subject to disturbances because it inc...