Attacks in mobile adhoc networks: A survey

In this paper we discuss various types of vulnerabilities in MANET. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper the principle focus is on various types of attacks in MANETs. | ISSN:2249-5789 Opinder Singh et al, International Journal of Computer Science & Communication Networks,Vol 6(4),194-197 ATTACKS IN MOBILE ADHOC NETWORKS: A SURVEY Opinder Singh†, Dr. Jatinder Singh‡, and Dr. Ravinder Singh‡ † Research Scholar, IKG PTU, Kapurthala, Punjab. ‡ IKG PTU, Kapurthala, Punjab. † opindermca2008@, ‡ bal_jatinder@, ‡ AbstractAbstract A MANET is an infrastructure-less type network, which consists of number of mobile nodes with wireless network interfaces. In order to make communication among nodes, the nodes dynamically establish paths among one another. Here each node participates in routing by forwarding data to other nodes. Though each node in MANET will act as host as well as router. In MANET nodes can directly communicate to all other nodes within the radio communication range. If a node could not have direct communication then they can use intermediate nodes to communicate with other nodes. For this reason, Security is a primary concern to provide protected communication between nodes in ad hoc networks and chances of having the vulnerabilities are also more. In this paper we discuss various types of vulnerabilities in MANET. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper the principle focus is on various types of attacks in MANETs. Keywords: MANET, Security, vulnerabilities, Attacks. I. INTRODUCTION Mobile Ad hoc Networks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. The mobile nodes in a MANET self organize together in some arbitrary fashion. A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. These networks can be applied between persons or between vehicles in areas which are depleted .

Bấm vào đây để xem trước nội dung
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.