CFP last date
20 January 2025
Reseach Article

Compromised Security of Wireless Ad-Hoc Networks and its Implications

Published on July 2015 by Komal
Innovations in Computing and Information Technology (Cognition 2015)
Foundation of Computer Science USA
COGNITION2015 - Number 2
July 2015
Authors: Komal
72ef1fcf-14be-4dac-9741-1099284e3cea

Komal . Compromised Security of Wireless Ad-Hoc Networks and its Implications. Innovations in Computing and Information Technology (Cognition 2015). COGNITION2015, 2 (July 2015), 25-30.

@article{
author = { Komal },
title = { Compromised Security of Wireless Ad-Hoc Networks and its Implications },
journal = { Innovations in Computing and Information Technology (Cognition 2015) },
issue_date = { July 2015 },
volume = { COGNITION2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 25-30 },
numpages = 6,
url = { /proceedings/cognition2015/number2/21896-2134/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Innovations in Computing and Information Technology (Cognition 2015)
%A Komal
%T Compromised Security of Wireless Ad-Hoc Networks and its Implications
%J Innovations in Computing and Information Technology (Cognition 2015)
%@ 0975-8887
%V COGNITION2015
%N 2
%P 25-30
%D 2015
%I International Journal of Computer Applications
Abstract

Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous networks with self-governed devices having peer-to-peer, real-time communication. Wireless ad-hoc networks have applicability in numerous areas including critical ones like disaster relief, crisis management, alert systems and military purposes. However, the autonomous nature of wireless ad-hoc networks (WANETs) makes them vulnerable to security breaches and attacks. The paper presents a security model for wireless ad-hoc networks and discusses security loopholes in ad-hoc networking with their repercussions.

References
  1. "Security Issues in Wireless Adhoc Networks and The Application to the telecare project", Proceedings of 2007 15th International Conference on Digital Signal Processing,pp 491-494, 2007.
  2. Sarvesh Tanwar, Prema K. V, "Threats & Security Issues in Ad hoc network : A Survey Report", International Journal of Soft Computing and Engineering, volume-2, Issue-6, January 2013.
  3. Safdar Ali Soomro, Sajjad Ahmed Soomro, Abdul Ghafoor Memom,Abdul Baqi, "Denial of Service Attacks in Wireless Ad hoc Networks" , Journal of Information & Communication Technology, Vol. 4, No. 2, (Fall 2010),pp 01-10.
  4. Martinus Dipobagio, "An overview on Ad hoc Networks", Institute of Computer Science (ICS),Freie Universitat Berlin.
  5. Yurong Xu, Guanling Chen, James Ford, Filia Makedon, "Detecting wormhole attacks in wireless sensor networks", Critical Infrastrcuture Protection, International Federation of Information Processing, volume 253, pp 267-279, 2008.
  6. Fahad Samad, Qassem Abu Ahmed,Asadullah Shaikh,Abdul Aziz, "JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks", Emerging Trends and Applications in Information Communication Technologies, Communication in Computer and Information Science, volume 281,pp 432-444, 2012.
  7. Po-Wah Yau, Chris J. Mitchell, "Security vulnerabilities in Ad hoc Networks", The Seventh International Symposium on Communication Theory and Applications, July 13–18, 2003, Ambleside, Lake District, UK, pages99–104. HW Communications Ltd, July 2003.
  8. Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal," Analysis of security threats & vulnerabilities in Mobile Ad Hoc Network ( MANET), International Journal of Computer Applications,Volume-68, No. 4, April 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Networks Wanets Ieee 802. 11 Security Attacks Vulnerability