Consequence of Security Attacks in MANET
Keywords:
MANET, DATA traffic attacks, CONTROL or REGULATE traffic attacks.Abstract
Now a days Security in MANET is a major challenge as it has no incorporated authority which can regulate the individual nodes functioning in the network. Moreover the attacks can come from both inside the network and from the outside. We are exasperating to classify the present attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. In continue with that I discussed the Consequence of Security Attack in MANET over inter network layer.
References
- C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97, Apr. 1997, pp. 197-211
- Th. Clausen et al., “Optimized Link State Routing Protocol,” IETF Internet draft, draft-ietfmanet-olsr11.txt, July 2003.
- B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
- Z. Karakehayov, “Using REWARD to Detect Team BlackHole Attacks in Wireless Sensor Networks,” Wksp. RealWorld Wireless Sensor Networks, June 20–21, 2005.
- S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
- S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
- S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
- D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
- Jyoti Raju and J.J. Garcia-Luna-Aceves, “ A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks’,” in Proceeding of IEEE ICC, June 2000.
- Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
- Eli-Chukwu, Ngozi Clara, Onoh, Greg Nwachukwu,” Improving Service Accessibility (CSSR) In GSM Network using an Intelligent Agent-Based Approach.” International Journal of Computer Engineering In Research Trends., vol.4, no.11, pp. 478-486, 2017.
- Prof. R. Poorvadevi , S.Keerthana , V.S. Ghethalaxmipriya , K. Venkatasailokesh,” An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services.” International Journal of Computer Engineering In Research Trends., vol.4, no.2, pp. 20-24, 2017.
- Yashoda B.S, Dr. K.R. Nataraj,” Performance Analysis of Existing Beam forming Methods for Various Antenna Elements and Interference Sources.” International Journal of Computer Engineering in Research Trends., vol.4, no.4, pp. 142-149, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.