Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)

Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)

Rakesh Kumar Singh
Copyright: © 2016 |Pages: 22
ISBN13: 9781466698406|ISBN10: 1466698403|EISBN13: 9781466698413
DOI: 10.4018/978-1-4666-9840-6.ch093
Cite Chapter Cite Chapter

MLA

Singh, Rakesh Kumar. "Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)." Big Data: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2016, pp. 2006-2027. https://doi.org/10.4018/978-1-4666-9840-6.ch093

APA

Singh, R. K. (2016). Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET). In I. Management Association (Ed.), Big Data: Concepts, Methodologies, Tools, and Applications (pp. 2006-2027). IGI Global. https://doi.org/10.4018/978-1-4666-9840-6.ch093

Chicago

Singh, Rakesh Kumar. "Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)." In Big Data: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 2006-2027. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9840-6.ch093

Export Reference

Mendeley
Favorite

Abstract

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.