CFP last date
20 May 2024
Reseach Article

Comparative Analysis of Various Attacks on MANET

by Pooja Chahal, Gaurav Kumar Tak, Anurag Singh Tomar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 12
Year of Publication: 2015
Authors: Pooja Chahal, Gaurav Kumar Tak, Anurag Singh Tomar
10.5120/19594-1383

Pooja Chahal, Gaurav Kumar Tak, Anurag Singh Tomar . Comparative Analysis of Various Attacks on MANET. International Journal of Computer Applications. 111, 12 ( February 2015), 42-46. DOI=10.5120/19594-1383

@article{ 10.5120/19594-1383,
author = { Pooja Chahal, Gaurav Kumar Tak, Anurag Singh Tomar },
title = { Comparative Analysis of Various Attacks on MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 12 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number12/19594-1383/ },
doi = { 10.5120/19594-1383 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:45.076258+05:30
%A Pooja Chahal
%A Gaurav Kumar Tak
%A Anurag Singh Tomar
%T Comparative Analysis of Various Attacks on MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 12
%P 42-46
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc Networks (MANET) is a part of wireless networks. No wires and fixed routers are used in this type of network. It is not everlasting network; it is the short term network. Nodes has the capability to self organize themselves and it follows infrastructure less architecture. Network is formed by number of nodes moving in an inconsistent manner. They do not form any topology. Few examples of Ad hoc wireless network devices are Laptops, palmtops, smart phones etc [6]. And every nodes further acts as routers which transfers packet from one node to another node. Security is one of the main issues in Mobile Ad hoc Network. From last few years security problems in MANETs are gaining much attention. As there are many security vulnerabilities in MANET and which is the reason that it is not safe from attacks. There are many types of MANET like VANET (Vehicular Ad hoc Network), SPANs (Smart Phone Ad hoc Networks), iMANET (Internet based Mobile Ad hoc Network), Tactical MANET. The aim of this paper is to discuss about different types of attacks in Ad hoc network and some of the techniques by which these attacks can be protected.

References
  1. Bhattasali, T. ,Chaki, R. and Sanyal, S. 2012. Sleep Deprivation Attack Detection in Wireless Sensor Network, International Journal of Computer Applications (0975 – 8887)
  2. Garg, R. , and Sharma, H. 2014. Proposed Lightweight Sybil Attack Detection Technique in MANET. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.
  3. Ullah. Irshad and Rehmaan, Shoaib. 2010. Analysis of Black hole Attack on MANET using different MANET routing protocols, Thesis no: MEE-2010-2698.
  4. Kumar, J. , Kulkarni, M. , Gupta, D. 2013. Effect of Black Hole Attack on MANET Routing Protocols, I. J. Computer Network and Information Security.
  5. L. Hu and D. Evans. 2004. Using directional antennas to prevent wormhole attacks, Proceedings of the Eleventh Network and Distributed System Security Symposium.
  6. Toh, C. K. 2001. Ad hoc mobile wireless networks: protocols and systems. Pearson Education.
  7. Hu, Y. , Perrig, A. and Johnson, D. 2006. Wormhole Attacks in Wireless Networks, IEEE JSAC.
  8. Xu, Y. , Chen, G. , Ford, J. , Makedon, F. , Goetz, E. , Shenoi, S. 2007. Detecting wormhole attacks in wireless sensor networks, Critical infrastructure protection, Springer US.
  9. Mamatha, G. S. , Sharma, S. C. 2010. A Highly Secured Approach against Attacks in MANETS. International Journal of Computer Theory and Engineering.
  10. Khemariya, N. , Khuntetha, A. 2013. An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs. International Journal of Computer Applications (0975 – 8887).
  11. Sharma, R. , Shrivastava, R. 2014. Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network. IJCSNS International Journal of Computer Science and Network Security.
  12. Kannhavong, B. , Nakayama, H. , Nemoto, Y. , Kato, N. 2007. A Survey Of Routing Attacks In Mobile Ad Hoc Networks. Ieee Wireless Communications.
  13. Kayalvizhi, K. , Senthilkumar, N. , Arulkumaran, G. 2014. Detecting Sybil Attack by Using Received Signal Strength in Manets. International Journal of Innovative Research in Science & Engineering.
  14. Jenniefer, A. and Jose, J. 2014. Techniques for Identifying Denial of Service Attack in Wireless Sensor Network: a Survey. International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2319-5940, Vol. 3.
Index Terms

Computer Science
Information Sciences

Keywords

Black hole attacks jellyfish attack Mobile Ad hoc network Sybil attack Sleep deprivation torture attack Wormhole attacks