An Overview of Constraints and Diverse Attacks in Mobile Ad-hoc Networks

Authors

  • Srinivas Aluvala Department of CSE, KL University, Guntur, India. Department of CS & AI, SR University, Warangal, India
  • K. Rajasekhar Department of CSE, KL University, Guntur, India.

Keywords:

MANETs, limitations, threats, attacks and authorization

Abstract

The task of relying on Mobile Ad hoc Networks (MANETs) is of significant importance due to the absence of a centralized framework. The continuous occurrence of clean nodules and the departure of aged ones in the MANET implementation necessitates the need to maintain records and provide appropriate authorization for new arriving nodes as well as existing nodes in the network. However, due to the presence of many types of breach threats and attacks, it becomes challenging to thoroughly examine any new node. Therefore, in order to ensure that only secure nodes are allowed to connect with the existing secure system. In a large cluster, the nodes within it are expected to engage in interactions, thereby facilitating or inhibiting access or communication between the vulnerable nodes or the trusted design. This dynamic system ensures the preservation of a stable, acquired, and reliable collection of transferable nodules. This paper provides a comprehensive examination of the limitations and diverse array of attacks in MANETs.

Downloads

Download data is not yet available.

References

AnjuRan, Sandeep Gupta, “Review on MANETs Characteristics, challenges, Application and Security Attacks”- International Journal of Science and Research (IJSR) 2015.

Harmanpreet Kaur, P.S. Mann, “Detection of Black Hole Attack in Mobile AD HOC networks a survey” International Journal of Science and Research (IJSR) 2014.

Aarti, Study of MANET: Characteristics, challenges,Application and Security Attacks-International Journal of Advance Research in Computer Science and software Engineering,2013.

Z. Karakehayov, “Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks,” Workshop on Real-World Wireless Sensor Networks, June 20–21, 2005.

Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE SAC, Vol. 24, No. 2, Feb. 2006.

HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,‖, Pg. 38-47, Vol 11, issue 1, Feb 2004.

Buttyan, L., and Hubaux, J. P. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications: Special Issue on Mobile Ad Hoc Networks, 8(5), 2003.

S. Corson and J. Macker, “RFC 2501 - Mobile Ad Hoc Networking (MANET): Routing Protocol Pe”, Network Working Group, Request for Comments: 2501, University of Maryland, Naval Research Laboratory, JAN 1999.

Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks”, Elsevier - Procedia Computer Science, 92, pp.554 – 561, 2016, DOI. 10.1016/j.procs.2016.07.382.

Deepika Vodnala, Dr. S. Phani Kumar, Srinivas Aluvala “An Analysis Study of Various Multicasting Routing Protocols in MANETs”, International Journal of Emerging Technology and Advanced Engi- neering; Volume 4, Issue 8, August 2014, page(s) 424- 429, ISSN 2250- 2459, Impact Factor: 2.324.

Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, "A Novel Technique for Node Authentication in Mobile Ad-hoc Networks" in Elsevier - Perspectives in Science, Volume 8, Issue 1, Page No(s) 680 - 682, SEP. 2016, [ISSN(Print):2213-0209], DOI:10.1016/j.pisc.2016.

Srinivas Aluvala, G.Sunil, Nagendar Yamsani, Bura Vijaykumar “An Empirical Study of Issues in Security and Routing of Multicast Routing Protocols in Mobile Ad Hoc Networks” International Journal of Engineering and Technology (IJET), ISSN 2227-524X, Vol 7, No 3.34 (2018), special Issue 34, page(s): 1015–1018, December 2018, DOI. 10.14419/ijet.v7i3.34.25353.

Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala “Analysis of Security Threats and Issues in MANETs”, International Journal on Advanced Computer Theory and Engineering (IJACTE), ISSN (Print): 2319-2526, Volume 4, Issue 5, page(s): 23-28, 2015, Impact Factor: 1.64.

Downloads

Published

25.12.2023

How to Cite

Aluvala, S. ., & Rajasekhar, K. . (2023). An Overview of Constraints and Diverse Attacks in Mobile Ad-hoc Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 419–423. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3916

Issue

Section

Research Article