We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks

Published on August 2013 by Nikhil Shukla, Shalini Gupta, Amit Virmani
National Conference on Recent Trends in Engineering and Management
Foundation of Computer Science USA
NCRTEM - Number 1
August 2013
Authors: Nikhil Shukla, Shalini Gupta, Amit Virmani
11cb1614-26e0-4a00-820c-8861d8a5635e

Nikhil Shukla, Shalini Gupta, Amit Virmani . Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks. National Conference on Recent Trends in Engineering and Management. NCRTEM, 1 (August 2013), 16-18.

@article{
author = { Nikhil Shukla, Shalini Gupta, Amit Virmani },
title = { Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks },
journal = { National Conference on Recent Trends in Engineering and Management },
issue_date = { August 2013 },
volume = { NCRTEM },
number = { 1 },
month = { August },
year = { 2013 },
issn = 0975-8887,
pages = { 16-18 },
numpages = 3,
url = { /proceedings/ncrtem/number1/13068-1304/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Engineering and Management
%A Nikhil Shukla
%A Shalini Gupta
%A Amit Virmani
%T Mobile Ad-Hoc Network (MANET): Security Issues Regarding Attacks
%J National Conference on Recent Trends in Engineering and Management
%@ 0975-8887
%V NCRTEM
%N 1
%P 16-18
%D 2013
%I International Journal of Computer Applications
Abstract

In this paper, we discuss the mobile ad hoc Network:Security issues regarding attacks. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. In the history of communication, the present time period has advent the mobile computing which has changed our information society. Applications of ad-hoc network have a wide range of applications such as in military operations, emergency disaster relief and many other several commercial based works (community networking, interaction between attendees at a meeting or students during a lecture). we survey the current security solutions for the mobile ad hoc network.

References
  1. M. G. Zapata and n. Asokan. Securing ad-hoc routing protocols. In wise '02: proceedings of the acm workshop on wireless security, pages 1–10, new york, ny, usa, 2002. Acm press. 93
  2. Wenbo He, Achieving privacy and integrity of data aggregation in Wireless sensor networks, University of Illinois at Urbana-Champaign, 2008.
  3. wikipedia. org/wiki/Mobile_adhoc_networ.
  4. Ramachandran and A. Yasinsac. Limitations of On Demand Secure Routing Protocols. Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 2004
  5. M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. ACM Transactions on Computer Systems, 1990.
  6. . Security Issues in Mobile Ad Hoc Networks-A Survey Wenjia Li and Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County
  7. P. Papadimitriou and Z. Haas. Secure Routing for Mobile Ad-hoc Networks. In Proceedings of SCS communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.
  8. Yih-Chun Hu Adrian Perrig, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, 2003 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Network Security Intrusion Detection Secure Routing