An Overview of Constraints and Diverse Attacks in Mobile Ad-hoc Networks
Keywords:
MANETs, limitations, threats, attacks and authorizationAbstract
The task of relying on Mobile Ad hoc Networks (MANETs) is of significant importance due to the absence of a centralized framework. The continuous occurrence of clean nodules and the departure of aged ones in the MANET implementation necessitates the need to maintain records and provide appropriate authorization for new arriving nodes as well as existing nodes in the network. However, due to the presence of many types of breach threats and attacks, it becomes challenging to thoroughly examine any new node. Therefore, in order to ensure that only secure nodes are allowed to connect with the existing secure system. In a large cluster, the nodes within it are expected to engage in interactions, thereby facilitating or inhibiting access or communication between the vulnerable nodes or the trusted design. This dynamic system ensures the preservation of a stable, acquired, and reliable collection of transferable nodules. This paper provides a comprehensive examination of the limitations and diverse array of attacks in MANETs.
Downloads
References
AnjuRan, Sandeep Gupta, “Review on MANETs Characteristics, challenges, Application and Security Attacks”- International Journal of Science and Research (IJSR) 2015.
Harmanpreet Kaur, P.S. Mann, “Detection of Black Hole Attack in Mobile AD HOC networks a survey” International Journal of Science and Research (IJSR) 2014.
Aarti, Study of MANET: Characteristics, challenges,Application and Security Attacks-International Journal of Advance Research in Computer Science and software Engineering,2013.
Z. Karakehayov, “Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks,” Workshop on Real-World Wireless Sensor Networks, June 20–21, 2005.
Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE SAC, Vol. 24, No. 2, Feb. 2006.
HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,‖, Pg. 38-47, Vol 11, issue 1, Feb 2004.
Buttyan, L., and Hubaux, J. P. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications: Special Issue on Mobile Ad Hoc Networks, 8(5), 2003.
S. Corson and J. Macker, “RFC 2501 - Mobile Ad Hoc Networking (MANET): Routing Protocol Pe”, Network Working Group, Request for Comments: 2501, University of Maryland, Naval Research Laboratory, JAN 1999.
Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, “An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks”, Elsevier - Procedia Computer Science, 92, pp.554 – 561, 2016, DOI. 10.1016/j.procs.2016.07.382.
Deepika Vodnala, Dr. S. Phani Kumar, Srinivas Aluvala “An Analysis Study of Various Multicasting Routing Protocols in MANETs”, International Journal of Emerging Technology and Advanced Engi- neering; Volume 4, Issue 8, August 2014, page(s) 424- 429, ISSN 2250- 2459, Impact Factor: 2.324.
Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, "A Novel Technique for Node Authentication in Mobile Ad-hoc Networks" in Elsevier - Perspectives in Science, Volume 8, Issue 1, Page No(s) 680 - 682, SEP. 2016, [ISSN(Print):2213-0209], DOI:10.1016/j.pisc.2016.
Srinivas Aluvala, G.Sunil, Nagendar Yamsani, Bura Vijaykumar “An Empirical Study of Issues in Security and Routing of Multicast Routing Protocols in Mobile Ad Hoc Networks” International Journal of Engineering and Technology (IJET), ISSN 2227-524X, Vol 7, No 3.34 (2018), special Issue 34, page(s): 1015–1018, December 2018, DOI. 10.14419/ijet.v7i3.34.25353.
Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala “Analysis of Security Threats and Issues in MANETs”, International Journal on Advanced Computer Theory and Engineering (IJACTE), ISSN (Print): 2319-2526, Volume 4, Issue 5, page(s): 23-28, 2015, Impact Factor: 1.64.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.