Consequence of Security Attacks in MANET

Authors

  • K. Ramakrishna Reddy   Associate Professor, Department of CSE, Malla Reddy Engineering College (A), Hyderabad, Telangana, India

Keywords:

MANET, DATA traffic attacks, CONTROL or REGULATE traffic attacks.

Abstract

Now a days Security in MANET is a major challenge as it has no incorporated authority which can regulate the individual nodes functioning in the network. Moreover the attacks can come from both inside the network and from the outside. We are exasperating to classify the present attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. In continue with that I discussed the Consequence of Security Attack in MANET over inter network layer.

References

  1. C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97, Apr. 1997, pp. 197-211
  2. Th. Clausen et al., “Optimized Link State Routing Protocol,” IETF Internet draft, draft-ietfmanet-olsr11.txt, July 2003.
  3. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
  4.  Z. Karakehayov, “Using REWARD to Detect Team BlackHole Attacks in Wireless Sensor Networks,” Wksp. RealWorld Wireless Sensor Networks, June 20–21, 2005.
  5. S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
  6. S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
  7. S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
  8. D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
  9. Jyoti Raju and J.J. Garcia-Luna-Aceves, “ A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks’,” in Proceeding of IEEE ICC, June 2000.
  10.  Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  11. Eli-Chukwu, Ngozi Clara, Onoh, Greg Nwachukwu,” Improving Service Accessibility (CSSR) In GSM Network using an Intelligent Agent-Based Approach.” International Journal of Computer Engineering In Research Trends., vol.4, no.11, pp. 478-486, 2017.
  12. Prof. R. Poorvadevi , S.Keerthana , V.S. Ghethalaxmipriya , K. Venkatasailokesh,” An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services.” International Journal of Computer Engineering In Research Trends., vol.4, no.2, pp. 20-24, 2017.
  13. Yashoda B.S, Dr. K.R. Nataraj,” Performance Analysis of Existing Beam forming Methods for Various Antenna Elements and Interference Sources.” International Journal of Computer Engineering in Research Trends., vol.4, no.4, pp. 142-149, 2017.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
K. Ramakrishna Reddy , " Consequence of Security Attacks in MANET, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 8, pp.1346-1352, November-December-2017.