CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Mobile Ad-hoc Networks - Various Attacks

Published on May 2012 by Krishan Kumar, Yogesh Kumar, Rajiv Munjal
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 15
May 2012
Authors: Krishan Kumar, Yogesh Kumar, Rajiv Munjal
a04a293d-6487-4a76-a1f1-82e467fe944b

Krishan Kumar, Yogesh Kumar, Rajiv Munjal . Mobile Ad-hoc Networks - Various Attacks. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 15 (May 2012), 12-15.

@article{
author = { Krishan Kumar, Yogesh Kumar, Rajiv Munjal },
title = { Mobile Ad-hoc Networks - Various Attacks },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 15 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 12-15 },
numpages = 4,
url = { /proceedings/rtmc/number15/7143-1093/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Krishan Kumar
%A Yogesh Kumar
%A Rajiv Munjal
%T Mobile Ad-hoc Networks - Various Attacks
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 15
%P 12-15
%D 2012
%I International Journal of Computer Applications
Abstract

An ad-hoc network is a collection of wireless mobile nodes that forms a temporary network without any centralized administration. While early research effort assumed a friendly and cooperative environment and focused on problems such as wireless channel access and multihop routing, security has become a primary concern in order to provide protected communication between nodes in a potentially hostile environment. Recent wireless research indicates that the wireless MANET (Mobile Ad hoc Network) presents a larger security problem than conventional wired and wireless networks. In this paper we discuss various features of MANET due to which network is more susceptible to threats. We also analyze various attacks in MANET.

References
  1. Han L, "Wireless Ad hoc Network", October 8, 2004.
  2. Kamanshis Biswas and Md. Liakat Ali, "Security Threats in Mobile Ad Hoc Network", Master Thesis, Thesis no: MCS-2007:07, March 22, 2007.
  3. Vesa Kärpijoki; Security in Ad Hoc Networks; Helsinki University of Technology; HUT TML 2000 .
  4. Felix Lau, Stuart H. Rubin, Michael H. Smith and Ljiljana TrajkoviC; Distributed Denial of Service Attacks; 2275-2280/2004 IEEE.
  5. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, "Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method", International Journal of Network Security, Vol. 5, No. 3, PP. 338–346, Nov. 2007.
  6. J. Douceur, "The Sybil attack", Peer-to-Peer Systems: First International Workshop (ITPTS 2002), Lecture Notes in Computer Science 2429, Springer-Verlag, March 2002, pp. 251-260 .
  7. Sarosh Hashmi, John Brooke, "Authentication Mechanisms for Mobile Ad-hoc Networks and Resistance to Sybil Attack", Proceedings of The Second International Conference on Emerging Security Information, Systems and Technologies, 2008.
  8. Jaydip Sen, M. Girish Chandra, Harihara S. G. , Harish Reddy, P. Balamuralidhar, "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks", Proceedings of 10th
  9. Stephen M. Specht and Ruby B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures", Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543- 550, September 2004.
  10. P. Michiardi and R. Molva, "Ad hoc Networks Security", IEEE Press Wiley, New York, 2003.
  11. Gao Xiaopeng Chen Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks",Proceedings of International Conference on Network and Parallel Computing – Workshops, July 2007.
  12. M. Just, E. Kranakis, and T. Wan,. "Resisting Malicious Packet Dropping. In Wireless Ad Hoc Networks", In Proceedings of ADHOC-NOW, Oct. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Black Hole Gray Hole Sybil Selfish Dos