TAILIEUCHUNG - Attacks in mobile adhoc networks: A survey

In this paper we discuss various types of vulnerabilities in MANET. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper the principle focus is on various types of attacks in MANETs. | ISSN:2249-5789 Opinder Singh et al, International Journal of Computer Science & Communication Networks,Vol 6(4),194-197 ATTACKS IN MOBILE ADHOC NETWORKS: A SURVEY Opinder Singh†, Dr. Jatinder Singh‡, and Dr. Ravinder Singh‡ † Research Scholar, IKG PTU, Kapurthala, Punjab. ‡ IKG PTU, Kapurthala, Punjab. † opindermca2008@, ‡ bal_jatinder@, ‡ AbstractAbstract A MANET is an infrastructure-less type network, which consists of number of mobile nodes with wireless network interfaces. In order to make communication among nodes, the nodes dynamically establish paths among one another. Here each node participates in routing by forwarding data to other nodes. Though each node in MANET will act as host as well as router. In MANET nodes can directly communicate to all other nodes within the radio communication range. If a node could not have direct communication then they can use intermediate nodes to communicate with other nodes. For this reason, Security is a primary concern to provide protected communication between nodes in ad hoc networks and chances of having the vulnerabilities are also more. In this paper we discuss various types of vulnerabilities in MANET. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper the principle focus is on various types of attacks in MANETs. Keywords: MANET, Security, vulnerabilities, Attacks. I. INTRODUCTION Mobile Ad hoc Networks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. The mobile nodes in a MANET self organize together in some arbitrary fashion. A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. These networks can be applied between persons or between vehicles in areas which are depleted .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.