CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Review of Various Attacks and a New Secure Data Transmission Mechanism for MANET

by Ira Nath, Prosenjit Chakraborty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 1
Year of Publication: 2016
Authors: Ira Nath, Prosenjit Chakraborty
10.5120/ijca2016911437

Ira Nath, Prosenjit Chakraborty . Review of Various Attacks and a New Secure Data Transmission Mechanism for MANET. International Journal of Computer Applications. 150, 1 ( Sep 2016), 1-5. DOI=10.5120/ijca2016911437

@article{ 10.5120/ijca2016911437,
author = { Ira Nath, Prosenjit Chakraborty },
title = { Review of Various Attacks and a New Secure Data Transmission Mechanism for MANET },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 1 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number1/26054-2016911437/ },
doi = { 10.5120/ijca2016911437 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:54:42.085138+05:30
%A Ira Nath
%A Prosenjit Chakraborty
%T Review of Various Attacks and a New Secure Data Transmission Mechanism for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 1
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For transmission of data over Ad-hoc network, various routing protocols along with some lack of security are present. So, some attacks of different types may occur on data. As a result some important data may be captured by a stranger node. Here, a new algorithm has been proposed, through which accessing important data can be restricted by un-authorized user(s). This approach is to design a system that works with low cost & high security. So, using only one algorithm users can receive & send data surely with minimal cost by avoiding all possible attacks.

References
  1. Ms. N.S.Raote* et al. “Approaches towards Mitigating Wormhole Attack in Wireless Ad-hoc Network”, INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES(IJAEST) Vol No. 2, Issue No. 2, 172 - 175
  2. YIH-CHUN HU, ADRIAN PERRIG, DAVID B. JOHNSON, “Ariadne: Secure On-Demand Routing in Ad-Hoc Networks”, Springer Science Business Media, Inc. Manufactured in The Netherlands, Wireless Networks 11, 21–38, 2005.
  3. Ahmad Alomari, Marius Iulian Mihailescu, “Improvement authentication of routing protocols for Mobile Ad Hoc networks”, 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31, IACSIT Press, Singapore, 2012.
  4. http://techterms.com/definition/adhocnetwork.
  5. http://airccse.org/journal/ijdps/papers/1111ijdps28.pdf.
  6. https://en.wikipedia.org/wiki/Mobile_ad_hoc_network.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Attacks Security.