Consequence of Security Attacks in MANET

Authors(1) :-Dr. K. Rama Krishna Reddy

Now a days Security in MANET is a major challenge as it has no incorporated authority which can regulate the individual nodes functioning in the network. Moreover the attacks can come from both inside the network and from the outside. We are exasperating to classify the present attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. In continue with that I discussed the Consequence of Security Attack in MANET over inter network layer.

Authors and Affiliations

Dr. K. Rama Krishna Reddy
Associate Professor, Department of CSE, Malla Reddy Engineering College (A), Hyderabad, Telangana, India

MANET, DATA traffic attacks, CONTROL or REGULATE traffic attacks.

  1. C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97, Apr. 1997, pp. 197-211
  2. Th. Clausen et al., “Optimized Link State Routing Protocol,” IETF Internet draft, draft-ietfmanet-olsr11.txt, July 2003.
  3. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
  4.  Z. Karakehayov, “Using REWARD to Detect Team BlackHole Attacks in Wireless Sensor Networks,” Wksp. RealWorld Wireless Sensor Networks, June 20–21, 2005.
  5. S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
  6. S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
  7. S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
  8. D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
  9. Jyoti Raju and J.J. Garcia-Luna-Aceves, “ A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks’,” in Proceeding of IEEE ICC, June 2000.
  10.  Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  11. Eli-Chukwu, Ngozi Clara, Onoh, Greg Nwachukwu,” Improving Service Accessibility (CSSR) In GSM Network using an Intelligent Agent-Based Approach.” International Journal of Computer Engineering In Research Trends., vol.4, no.11, pp. 478-486, 2017.
  12. Prof. R. Poorvadevi , S.Keerthana , V.S. Ghethalaxmipriya , K. Venkatasailokesh,” An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services.” International Journal of Computer Engineering In Research Trends., vol.4, no.2, pp. 20-24, 2017.
  13. Yashoda B.S, Dr. K.R. Nataraj,” Performance Analysis of Existing Beam forming Methods for Various Antenna Elements and Interference Sources.” International Journal of Computer Engineering in Research Trends., vol.4, no.4, pp. 142-149, 2017.

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2017
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1346-1352
Manuscript Number : IJSRST1841156
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Dr. K. Rama Krishna Reddy, " Consequence of Security Attacks in MANET", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 3, Issue 8, pp.1346-1352, November-December-2017.
Journal URL :

Article Preview