CFP last date
20 January 2025
Reseach Article

Review and Analysis of the Security Issues in MANET

by Preeti Gulia, Sumita Sihag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 8
Year of Publication: 2013
Authors: Preeti Gulia, Sumita Sihag
10.5120/13131-0498

Preeti Gulia, Sumita Sihag . Review and Analysis of the Security Issues in MANET. International Journal of Computer Applications. 75, 8 ( August 2013), 23-26. DOI=10.5120/13131-0498

@article{ 10.5120/13131-0498,
author = { Preeti Gulia, Sumita Sihag },
title = { Review and Analysis of the Security Issues in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 8 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number8/13131-0498/ },
doi = { 10.5120/13131-0498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:44.072483+05:30
%A Preeti Gulia
%A Sumita Sihag
%T Review and Analysis of the Security Issues in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 8
%P 23-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Networks (MANETs) are one of the fastest emerging networks. MANET is a unstructured network in which nodes are mobile. This mobility may leads to insecurity in MANET. BFOA (Bacterial foraging optimization algorithm) is a Bio-inspired Algorithm. This algorithm simulates behavior of bacteria that can be effectively applied in various fields. This paper discusses various attacks and their prevention technique in MANET. This paper also reviews Bacteria foraging optimization algorithm and how it can be applied to secure the MANET.

References
  1. Sevil ?en, John A. Clark, Juan E. Tapiador, in Security Threats in Mobile Ad Hoc Networks.
  2. internet Engineering Task Force MANET Working Group. Mobile Ad hoc networks (Manet) Charter Available at http:// www. ietf. org/html. charters/manet-charter. html.
  3. Asis Nasipuri, Mobile Adhoc networks,Department of Electrical and Computer Engineering, The university of North Carolina at charlotte. Charlotte,NC 28233-0001
  4. Mr. Rajneesh Kumar, Dr. Anil Kapil, An Efficient Searching and an Optimized Cache Coherence handling Scheme on DSR Routing Protocol for MANETS, in IJCSI Vol 8, Issue 1, Jan 2011.
  5. M. Steiner, Tsudik G. , and Waidner M. , "Diffie-Hellman Key Distribution Extended to Group Communication", In Proc of the ACM Conference on Computer and Communication Security, pp. 31-37, 1996.
  6. Antonio Martin Boston University Conference on Information Assurance and Cyber Security, "A Platform Independent Risk Analysis for Mobile Ad hoc Networks"2006.
  7. Gagandeep, Ashima, Pawan kumar, Analysis of different security attacks in MANETs on protocol stack, in IJEAT Vol1, issue 5, 2012.
  8. Ankita Gupta, Sanjay Parkash Ranga, various routing attacks in mobile Ad-Hoc networks, at http\ www. ijccr. com, Vol 2, issue 4, 2012
  9. Abhay kumar Rai, Rajeev Ranjan Tewari, Saurabh Kant Upadhyay, Different types of attacks on integrated MANET internet communication in IJCSS, Vol 4 Issue 3 .
  10. K. Sahadevaiah, Department of computer science and engineering, Impact of security attacks on a new security protocol for mobile Ad-Hoc networks, 2011.
  11. Zaiba Ishrat, Security issues, challenges & solution in MANET in IJCST Vol 2, Issue 4, oct-nov 2011.
  12. kuldeep Sharma, Neha Khandelwal, Parabhakar. M, An overview of security problems in MANET.
  13. Swagatam Das,Sambarta Das Gupta, Arijith Abraham, Senior member,IEEE, and Amit Kanas,meber IEEE, Vol 39, May 2009.
  14. Bing Wu Jianmin Chen, Jie Wu, Mihaela Cardei, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks in Springer 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Bfoa Ids Security.