A mobile Ad hoc network (MANET) has played an imperative role in making very fast connection of mobile devices without including any centralize equipment. It is the simplest way to transfer files between two or more devices that can also act as routers. Now a day, the appropriate uses of this modern wireless communication are in emergency rescue situation, military scenarios, sensor networks, conferences and many others. Mobile Ad hoc Networks are adopted when wired networks are malfunctioning or broken down due to some unavoidable situation. This rapidly deployed network collaborates without using any preexisting fixed network infrastructure. Due to rapid deployment of mobile nodes or frequent change in network topology, security is the most important concern in Mobile Ad hoc Network. Due to its limited physical security, energy constrained operations and lack of centralized administration; Ad hoc Networks are more vulnerable to attacks than a wired networks or traditional networks. With the proliferation of cheaper, small, and more powerful mobile devices, mobile ad hoc networks (MANETs) have become one of the fastest growing areas of research. In this paper we are attempting to analyze the security attacks in Ad-hoc environment and focusing on various areas of security requirement, different types of active and passive attacks in Ad-hoc networks. General TermsMobile Ad Hoc Network, Security, Secure Routing in MANETs.
Now a day, security in Mobile Ad hoc Network (MANET) is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Mobile ad hoc Network (MANET) is different than wireless sensor network (WSN). Mobile ad hoc network is more vulnerable than WSN. Therefore attacks in MANETs are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. In this paper, we are considering a zone with multiple black hole nodes that can work co-operatively and we are implementing Secure-ZRP protocol which can be used to prevent black hole attack in MANETs. We evaluated performance in Qualnet simulator. Our analysis indicates that S-ZRP is very suitable & efficient protocol to stop this attack. General TermsMobile Ad Hoc Network, Security, Secure Routing in MANETs.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.