2013
DOI: 10.5815/ijieeb.2013.03.06
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges and Attacks in Mobile Ad Hoc Networks

Abstract: Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Wired Attackers [7], Single vs. Multiple Layer Attacks [7]. Attacks may affect functionality of single layer or of multiple layers of the network.…”
Section: Classification Of Attacksmentioning
confidence: 99%
“…Wired Attackers [7], Single vs. Multiple Layer Attacks [7]. Attacks may affect functionality of single layer or of multiple layers of the network.…”
Section: Classification Of Attacksmentioning
confidence: 99%
“… Access Control: [3] The whole service is designed to control resource utilization such as the host system or program.  Availability: [4] Accessibility includes allowing authorized users to access network services or resources. Despite malicious incidences, it ensures the survival of the network.…”
Section: B Mobile Ad-hoc Network Security Aspectsmentioning
confidence: 99%
“…These security attacks have adverse effect on performance measures of MANET. Attacks may affect functionality of single layer or of multiple layers of the network [15]. In single layer attacks, attacker exploits functionality of a layer to launch the attack.…”
Section: Introductionmentioning
confidence: 99%