Full Paper View Go Back

A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network

Shailja Sharma1

1 Computer Science, Career College, Bhopal, India.

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.66-69, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.6669


Online published on Apr 30, 2018


Copyright © Shailja Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shailja Sharma, “A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.66-69, 2018.

MLA Style Citation: Shailja Sharma "A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 66-69.

APA Style Citation: Shailja Sharma, (2018). A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network. International Journal of Scientific Research in Network Security and Communication, 6(2), 66-69.

BibTex Style Citation:
@article{Sharma_2018,
author = {Shailja Sharma},
title = {A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {66-69},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=330},
doi = {https://doi.org/10.26438/ijcse/v6i2.6669}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.6669}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=330
TI - A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Shailja Sharma
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 66-69
IS - 2
VL - 6
SN - 2347-2693
ER -

706 Views    391 Downloads    276 Downloads
  
  

Abstract :
MANETs has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open access medium, dynamically changing network topology and lack of centralized monitoring point. The various attacks against mobile nodes are flooding, black hole, warm hole, packet dropping and Byzantine attack as well as Collaborative attacks i.e. human attackers or criminal organizations etc. We have addressed the Vulnerabilities and attacks in MANETs in this paper.

Key-Words / Index Term :
MANET, Protocols, Attacks, Security Issues

References :
[1] Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, An analysis of Security Attacks found in Mobile Ad-hoc Network, International Journal of Advanced Research in Computer Science, Volume 5, No. 5, pp. 34-39, May-June 2014.
[2] Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks.
[3] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002
[4] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.
[5] L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, IC#/ICO#S/MCL`06, vol. 2006, p. 1628384, 2006.
[6] S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," 2004.
[7] C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON `97, Apr. 1997, pp. 197-211.
[8] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91.
[9] Z. Karakehayov, “Using REWARD to Detect Team Black- Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
[10] S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
[11] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.
[12] Shuyao Yu, Youkun Zhang, Chuck Song and Kai Chen, security architecture for Mobile Ad Hoc Networks”. http://www.portal.prozhe118.com, pp.1-4.
[13] L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, , vol. 2, 2006.
[14] S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," www.scm.tees.ac.uk, pp.-1-6, 2004.
[15] A. Mishra, Security and Quality of Service in Ad Hoc Wireless Networks, 2008.
[16] L. Tamilselvan and V. Sankaranarayanan, "Prevention of co-operative black hole attack in MANET," Journal of networks, vol. 3, pp. 13-20, 2008.
[17] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002.
[18] S. Saraeian, F. Adibniya, M. GhasemZadeh, and S. Abtahi, "Performance Evaluation of AODV Protocol under DDoS Attacks in MANET," Proceedings of World Academy of Science, Engineering and Technology, vol. Vol. 33, pp. 501 - 503, September 2008.
[19] Abolhasan, M., Wysocki, T., and Dutkiewicz, E. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 2004, pp. 1–22.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation