Reference Hub6
Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks

Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks

Arif Sari
ISBN13: 9781466683457|ISBN10: 1466683457|EISBN13: 9781466683464
DOI: 10.4018/978-1-4666-8345-7.ch005
Cite Chapter Cite Chapter

MLA

Sari, Arif. "Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks." New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, IGI Global, 2015, pp. 66-94. https://doi.org/10.4018/978-1-4666-8345-7.ch005

APA

Sari, A. (2015). Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. In M. Dawson & M. Omar (Eds.), New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 66-94). IGI Global. https://doi.org/10.4018/978-1-4666-8345-7.ch005

Chicago

Sari, Arif. "Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, 66-94. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8345-7.ch005

Export Reference

Mendeley
Favorite

Abstract

The purpose of this chapter is to investigate and expose methods and techniques developed to provide security in wireless ad hoc networks. Researchers have proposed variety of solutions for security problems of Wireless Mobile Ad-Hoc Networks (MANET) against Distributed Denial of Service (DDoS) attacks. Due to the wireless nature of the channels and specific characteristics of MANETs, the attacks cannot be defeated through conventional security mechanisms. An adversary can easily override its medium access control protocol (MAC) and continually transfer packages on the network channel and the access point node(s) cannot assign authorization access to shared medium. These attacks cause a significant decrease on overall network throughput, packet transmission rates and delay in the MAC layer since other nodes back-off from the communication. In this chapter the proposed methods are applied for preventing and mitigating different wireless ad hoc network attacks are investigated and effectiveness and efficiency of these mechanisms are exposed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.