CFP last date
20 May 2024
Reseach Article

Attacks on Mobile Ad hoc networks: A Survey

Published on March 2017 by Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao
Emerging Trends in Computing
Foundation of Computer Science USA
ETC2016 - Number 1
March 2017
Authors: Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao
720e7baf-2a60-495d-994a-251bff6b9cd6

Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao . Attacks on Mobile Ad hoc networks: A Survey. Emerging Trends in Computing. ETC2016, 1 (March 2017), 1-2.

@article{
author = { Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao },
title = { Attacks on Mobile Ad hoc networks: A Survey },
journal = { Emerging Trends in Computing },
issue_date = { March 2017 },
volume = { ETC2016 },
number = { 1 },
month = { March },
year = { 2017 },
issn = 0975-8887,
pages = { 1-2 },
numpages = 2,
url = { /proceedings/etc2016/number1/27299-6250/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computing
%A Joshua Reginald Pullagura
%A Perala.srikanth
%A D.venkata Rao
%T Attacks on Mobile Ad hoc networks: A Survey
%J Emerging Trends in Computing
%@ 0975-8887
%V ETC2016
%N 1
%P 1-2
%D 2017
%I International Journal of Computer Applications
Abstract

In recent years Wireless technology iswidely used with the advent of IEEE 802 standard. Lowrate Wireless personal area networks are widely usedbecause of low cost. A mobile ad-hoc network isinfrastructure less network which consist of mobile devices connected wirelesslyand usually move to other places from time totime, move around or join the network. Over the pastyears simulation work has been carried out to achievereliable routing protocol for IEEE 802 standard. The Wireless sensor and ad hoc networks are easily prone to security attacks, once deployed these networks are prone to be attacked and are unprotected. This paper mainly concentrates on various attacks that degrade the network performance. Attacks on the node degrade systemperformance, especially during the route discovery process by malicious entities which results in data loss and slower the network speed. In this paper various security threats will be discussed extensively.

References
  1. Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 , IEEE 2003.
  2. Eugene Y. Vasserman and Nicholas Hopper "Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks"- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12,NO. 2, FEBRUARY. 2013.
  3. Denial of service attacks(Timothy J. Mc Nevin, Jung-Min Park), IEEE 2004 University of Texas at San Antonio, San Antonio, TX 782490667.
  4. J. Deng, R. Han, and S. Mishra,"Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, IEEE 2005.
  5. Aashima, Gagandeep, Pawan Kumar,Analysisof Different Security Attacks in MANETs on Protocol Stack A – Review,International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 –8958, Volume-1,Issue-5, June2012
  6. Frank Stajano and Ross Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, International workshop on Security protocols, IEEE 1999.
  7. Rashid Hafeez Khokhar, Md Asri Ngadi & Satria Mandala,A Review of Current Routing Attacks inMobile Ad Hoc Networks,International Journal of Computer Science andSecurity, volume (2) issue (3).
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Networks Attacks Vampire Black Hole protocols