We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A Taxonomy of Physical Layer Attacks in MANET

by Shefali Khatri, Punit Sharma, Prashant Chaudhary, Anchit Bijalwan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 22
Year of Publication: 2015
Authors: Shefali Khatri, Punit Sharma, Prashant Chaudhary, Anchit Bijalwan
10.5120/20684-3517

Shefali Khatri, Punit Sharma, Prashant Chaudhary, Anchit Bijalwan . A Taxonomy of Physical Layer Attacks in MANET. International Journal of Computer Applications. 117, 22 ( May 2015), 6-11. DOI=10.5120/20684-3517

@article{ 10.5120/20684-3517,
author = { Shefali Khatri, Punit Sharma, Prashant Chaudhary, Anchit Bijalwan },
title = { A Taxonomy of Physical Layer Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 22 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number22/20684-3517/ },
doi = { 10.5120/20684-3517 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:04.576699+05:30
%A Shefali Khatri
%A Punit Sharma
%A Prashant Chaudhary
%A Anchit Bijalwan
%T A Taxonomy of Physical Layer Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 22
%P 6-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent days, Mobile Adhoc Networks have emerged as a major next generation wireless network technology. The wireless and distributed nature of MANETs paves way for the intruder to degrade the functionality of MANET. MANETs are vulnerable to numerous attacks at all layers, because the design of most MANET routing protocols assumes as if there is no malicious intruder node in the network. MANET is a collection of self configurable mobile nodes where each node acts as a router for other nodes, which allows data to travel, utilizing multi-hop network paths. In this paper, we made an exhaustive survey on various attacks in MANET and we try to categorize various attacks on the physical layer.

References
  1. V. K. Upadhyay and R. Shukla, "An Assessment of Worm Hole attack over mobile ad-hoc Network as derious threats ", Int J. advanced Networking and Applications , Vol. 5, Issue 1, ISSN : 0975-0290, August 2013.
  2. J. Thalor and Monika, "Wormhole attack detection and prevention technique in Mobile Adhoc Networks" ,International Journal of Advanced Research in computer Science and Software Engineering, Vol. 3, Issue 2, February 2013.
  3. Monika, M. kumar and R. rishi, "Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review", International Journal of Computer Applications (0975 – 8887), Volume 12– No. 2, November 2010
  4. C. Suhashini and S. Sivakumar, "A Secure Approach with Physical Layer Encryption in MANET", International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Special Issue 1, ISSN (Online) : 2319 – 8753, February 2014
  5. M. A. Zafer, D. Agrawal, and M. Srivatsa, "Bootstrapping Coalition MANETs: Physical-Layer Security under Active Adversary"
  6. K. Sivakumar and Dr. G. Selvaraj,"Overview of various attacks in Manet and countermeasures for attacks", International Journal of Computer Science and Management Research, Vol 2 Issue 1, ISSN 2278-733X, January 2013
  7. J. G. Ponsam and Dr. R. Srinivasan, "A Survey on MANET Security Challenges, Attacks and its Countermeasures", International Journal of Emerging Trends & Technology in Computer Science, Volume 3, Issue 1, ISSN 2278-6856, January – February 2014
  8. V. Balakrishnan and V. Varadharajan, "Designing Secure Wireless Mobile Ad hoc Networks" Information and Networked System Security Research Group
  9. D. Devi Aruna and Dr. P. Subashini , "Securing Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario", International Journal of Electronics and Computer Science Engineering, V1N3-1840-1849, ISSN- 2277-1956
  10. Dr. G. Padmavathi, Dr. P. Subashini and Ms. D. Devi Aruna, "DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 1, January 2012
  11. S. Boora and S. Ohri," A Survey of Layer Specific and Cryptographic Primitive attacks and their countermeasures in Manet's",International Journal of P2P Network Trends and Technology (IJPTT) –Vol. 3 Issue4- May 2013
  12. Jeremy J. Blum, Andrew Neiswender, and Azim Eskandarian,"Denial of Service Attacks on Inter- Vehicle Communication Networks" in 11th IEEE conference on Intelligent Transportation Systems, 2008, pp 797-802
  13. Le Wang and A. M. Wyglinski, "A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks"
  14. G. Jayanthi Lakshmi,S. Babu , B Lakshmana Rao, P Mohan and B Sunil Kumar," Jamming Attacks Prevenrion in Wireless sensor Networks Using Secure Packet Hiding Method" International Journal of Advanced Research in Computer and Communication Engineering,Vol. 2, Issue 9, ISSN (Print) : 2319-5940 ISSN (Online) : 2278-1021 September 2013
  15. Ms. P. K. Karmore and S. T. Bodkh, "A survey On Intrusion in adhoc networks and its detection Measures"?, International Journal on Computer Science and Engineering (IJCSE).
  16. M. Wazid, R. Kumar Singh & R. H. Goudar," A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques", International Journal of Computer Applications, International Conference on Computer Communication and Networks CSI- COMNET-2011.
  17. Zubair Muhammad Fadlullah, Tarik Taleb, and Marcus Schöller, "Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs)".
  18. Vikrant Gokhale, S. K. Gosh, and Arobinda Gupta, "Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks a Survey".
  19. Gagandeep, Aashima & P. Kumar," Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review", International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Vol. 1, Issue-5, June 2012.
Index Terms

Computer Science
Information Sciences

Keywords

MANET MAC DSSS