CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Analysis and Diminution of Security Attacks on Mobile Ad hoc Network

Published on None 2010 by K.P.Manikandan, Dr.R.Satyaprasad, Dr.Rajasekhararao
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 3
None 2010
Authors: K.P.Manikandan, Dr.R.Satyaprasad, Dr.Rajasekhararao
40ed743c-4abb-4bf3-aa5c-26b84bb72e03

K.P.Manikandan, Dr.R.Satyaprasad, Dr.Rajasekhararao . Analysis and Diminution of Security Attacks on Mobile Ad hoc Network. Mobile Ad-hoc Networks. MANETS, 3 (None 2010), 105-110.

@article{
author = { K.P.Manikandan, Dr.R.Satyaprasad, Dr.Rajasekhararao },
title = { Analysis and Diminution of Security Attacks on Mobile Ad hoc Network },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 3 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 105-110 },
numpages = 6,
url = { /specialissues/manets/number3/1030-75/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A K.P.Manikandan
%A Dr.R.Satyaprasad
%A Dr.Rajasekhararao
%T Analysis and Diminution of Security Attacks on Mobile Ad hoc Network
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 3
%P 105-110
%D 2010
%I International Journal of Computer Applications
Abstract

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. The nature of ad hoc networks poses a great challenge to system security designers due to the following reasons: firstly, the wireless network is more susceptible to attacks ranging from passive eavesdropping to active interfering; secondly, the lack of an online CA or Trusted Third Party adds the difficulty to deploy security mechanisms; thirdly, mobile devices tend to have limited power consumption and computation capabilities which makes it more vulnerable to Denial of Service attacks and incapable to execute computation-heavy algorithms like public key algorithms; The work mainly focuses on identifying preventive methods of impersonation security attacks on MANET.

References
  1. W. Wang and B. Bhargava, “Visualization of Wormholes in Sensor Networks,” in Proceedings of the 2004ACMWorkshop.
  2. M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM Southeast Regional Conf. 2004.
  3. S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
  4. B. Kannhavong et al., “A Collusion Attack Against OLSR-Based Mobile Ad Hoc Networks,”IEEE GLOBECOM’06.
  5. S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
  6. Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC,vol. 24, no. 2, Feb. 2006.
  7. Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”. Master's thesis, AtılımUniversity,September2006.
  8. S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th MobiCom, Boston, MA,Aug.2000.
  9. L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path,” IEEE Wireless Commun. And Networking Conf. ’05.
  10. D. Raffo et al., “Securing OLSR Using Node Locations,” Proc. 2005 Euro. Wireless, Nicosia,Cyprus, Apr.10–13,2005.
  11. P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks,” Int’l. J. Info. Tech., vol. 11,no. 2, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Security Diminution MANETs