International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 24 - Number 9 |
Year of Publication: 2011 |
Authors: Jayraj Singh, Arunesh Singh, Raj Shree |
10.5120/2989-3931 |
Jayraj Singh, Arunesh Singh, Raj Shree . An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. International Journal of Computer Applications. 24, 9 ( June 2011), 34-39. DOI=10.5120/2989-3931
A mobile Ad hoc network (MANET) has played an imperative role in making very fast connection of mobile devices without including any centralize equipment. It is the simplest way to transfer files between two or more devices that can also act as routers. Now a day, the appropriate uses of this modern wireless communication are in emergency rescue situation, military scenarios, sensor networks, conferences and many others. Mobile Ad hoc Networks are adopted when wired networks are malfunctioning or broken down due to some unavoidable situation. This rapidly deployed network collaborates without using any preexisting fixed network infrastructure. Due to rapid deployment of mobile nodes or frequent change in network topology, security is the most important concern in Mobile Ad hoc Network. Due to its limited physical security, energy constrained operations and lack of centralized administration; Ad hoc Networks are more vulnerable to attacks than a wired networks or traditional networks. With the proliferation of cheaper, small, and more powerful mobile devices, mobile ad hoc networks (MANETs) have become one of the fastest growing areas of research. In this paper we are attempting to analyze the security attacks in Ad-hoc environment and focusing on various areas of security requirement, different types of active and passive attacks in Ad-hoc networks.