Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Compromised Security of Wireless Ad-Hoc Networks and its Implications

IJCA Proceedings on Innovations in Computing and Information Technology (Cognition 2015)
© 2015 by IJCA Journal
COGNITION 2015 - Number 2
Year of Publication: 2015

Komal. Article: Compromised Security of Wireless Ad-Hoc Networks and its Implications. IJCA Proceedings on Innovations in Computing and Information Technology (Cognition 2015) COGNITION 2015(2):25-30, July 2015. Full text available. BibTeX

	author = {Komal},
	title = {Article: Compromised Security of Wireless Ad-Hoc Networks and its Implications},
	journal = {IJCA Proceedings on Innovations in Computing and Information Technology (Cognition 2015)},
	year = {2015},
	volume = {COGNITION 2015},
	number = {2},
	pages = {25-30},
	month = {July},
	note = {Full text available}


Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous networks with self-governed devices having peer-to-peer, real-time communication. Wireless ad-hoc networks have applicability in numerous areas including critical ones like disaster relief, crisis management, alert systems and military purposes. However, the autonomous nature of wireless ad-hoc networks (WANETs) makes them vulnerable to security breaches and attacks. The paper presents a security model for wireless ad-hoc networks and discusses security loopholes in ad-hoc networking with their repercussions.


  • "Security Issues in Wireless Adhoc Networks and The Application to the telecare project", Proceedings of 2007 15th International Conference on Digital Signal Processing,pp 491-494, 2007.
  • Sarvesh Tanwar, Prema K. V, "Threats & Security Issues in Ad hoc network : A Survey Report", International Journal of Soft Computing and Engineering, volume-2, Issue-6, January 2013.
  • Safdar Ali Soomro, Sajjad Ahmed Soomro, Abdul Ghafoor Memom,Abdul Baqi, "Denial of Service Attacks in Wireless Ad hoc Networks" , Journal of Information & Communication Technology, Vol. 4, No. 2, (Fall 2010),pp 01-10.
  • Martinus Dipobagio, "An overview on Ad hoc Networks", Institute of Computer Science (ICS),Freie Universitat Berlin.
  • Yurong Xu, Guanling Chen, James Ford, Filia Makedon, "Detecting wormhole attacks in wireless sensor networks", Critical Infrastrcuture Protection, International Federation of Information Processing, volume 253, pp 267-279, 2008.
  • Fahad Samad, Qassem Abu Ahmed,Asadullah Shaikh,Abdul Aziz, "JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks", Emerging Trends and Applications in Information Communication Technologies, Communication in Computer and Information Science, volume 281,pp 432-444, 2012.
  • Po-Wah Yau, Chris J. Mitchell, "Security vulnerabilities in Ad hoc Networks", The Seventh International Symposium on Communication Theory and Applications, July 13–18, 2003, Ambleside, Lake District, UK, pages99–104. HW Communications Ltd, July 2003.
  • Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal," Analysis of security threats & vulnerabilities in Mobile Ad Hoc Network ( MANET), International Journal of Computer Applications,Volume-68, No. 4, April 2013.