Reference Hub1
Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)

Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)

Rakesh Kumar Singh
Copyright: © 2016 |Pages: 23
ISBN13: 9781466694385|ISBN10: 1466694386|EISBN13: 9781466694392
DOI: 10.4018/978-1-4666-9438-5.ch012
Cite Chapter Cite Chapter

MLA

Singh, Rakesh Kumar. "Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)." Critical Socio-Technical Issues Surrounding Mobile Computing, edited by Norshidah Mohamed, et al., IGI Global, 2016, pp. 234-256. https://doi.org/10.4018/978-1-4666-9438-5.ch012

APA

Singh, R. K. (2016). Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET). In N. Mohamed, T. Mantoro, M. Ayu, & M. Mahmud (Eds.), Critical Socio-Technical Issues Surrounding Mobile Computing (pp. 234-256). IGI Global. https://doi.org/10.4018/978-1-4666-9438-5.ch012

Chicago

Singh, Rakesh Kumar. "Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)." In Critical Socio-Technical Issues Surrounding Mobile Computing, edited by Norshidah Mohamed, et al., 234-256. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9438-5.ch012

Export Reference

Mendeley
Favorite

Abstract

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.