Reference Hub20
Network Security: Attacks and Control in MANET

Network Security: Attacks and Control in MANET

Mamata Rath, Jhum Swain, Bibudhendu Pati, Binod Kumar Pattanayak
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch002
Cite Chapter Cite Chapter

MLA

Rath, Mamata, et al. "Network Security: Attacks and Control in MANET." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 19-37. https://doi.org/10.4018/978-1-5225-4100-4.ch002

APA

Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network Security: Attacks and Control in MANET. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 19-37). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch002

Chicago

Rath, Mamata, et al. "Network Security: Attacks and Control in MANET." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 19-37. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc Networks (MANETs) the individual nodes are self-reconfigurable according to the changes of the network topology. Joint effort between portable hubs is more critical because they face major challenges such as powerlessness to work safely while protecting its assets and performing secure steering among hubs. With the existence of malicious nodes, one of the principal challenges in MANETs is to outline powerful security arrangement that can shield MANETs from various routing attacks. This chapter highlights major attacks and control mechanism in MANETs with an intention that it will open directions for researchers to explore more in the field of network security. At the end of this chapter, basic security mechanisms and issues related to emergence of IoT from Mobile networks has been highlighted.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.