CFP last date
20 December 2024
Reseach Article

A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques

Published on Decmber 2011 by Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar
International Conference on Computer Communication and Networks CSI-COMNET-2011
Foundation of Computer Science USA
COMNET - Number 1
Decmber 2011
Authors: Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar
bb214841-c897-4de8-ade9-3c0bb7a2bdf1

Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar . A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 52-57.

@article{
author = { Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar },
title = { A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques },
journal = { International Conference on Computer Communication and Networks CSI-COMNET-2011 },
issue_date = { Decmber 2011 },
volume = { COMNET },
number = { 1 },
month = { Decmber },
year = { 2011 },
issn = 0975-8887,
pages = { 52-57 },
numpages = 6,
url = { /proceedings/comnet/number1/5422-1010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computer Communication and Networks CSI-COMNET-2011
%A Mohammad Wazid
%A Rajesh Kumar Singh
%A R. H. Goudar
%T A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques
%J International Conference on Computer Communication and Networks CSI-COMNET-2011
%@ 0975-8887
%V COMNET
%N 1
%P 52-57
%D 2011
%I International Journal of Computer Applications
Abstract

A Mobile Ad-Hoc Network (MANET) is a collection of mobile nodes (stations) communicating in a multi hop way without any fixed infrastructure such as access points or base stations. MANET has not well specified defense mechanism, so malicious attacker can easily access this kind of network. In this paper we investigate different types of attacks which are happened at the different layers of MANET after that we discuss some available detection techniques for these attacks. To our best knowledge this is the first paper that studies all these attacks corresponding to different layers of MANET with some available detection techniques

References
  1. Pradeep M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S. Ali,, Prof. J.S. Deshpanday, “A survey of mobile Ad-Hoc Network attacks ”, International Journal of Engineering Science & Technology, Vol. 2(3), 2010, 4063-4071.
  2. Yingnua Gua, a dissertation on “Defending MANET against flooding attacks by detective measures”, Institute of Telecommunication Research, The University of South Australia, April 2008.
  3. Kamanshis Biswas & Md. Liakat Ali, “Security threats in Mobile Ad-hoc Network”, Master theses, Department of Interaction & System Design, Blekinge Institute of Technology, Sweden 22nd of March 2007.
  4. Rashid Hafeez Khokhar, Md. Asri Ngadi, Satria Mandala, “A review of current routing attacks in Mobile Ad-Hoc Networks”, International Journal of Computer Science & Security, Vol.(2) Issue (3).
  5. Y-C. Hu, A. Perig, and D. Johnson, “Wormhole attacks in Wireless Networks”, IEEE JSAC, Vol-24, no.2, Feb2006.
  6. B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of attacks and countermeasures in Mobile Ad-Hoc Networks” Department. Of CSE, Florida State University, http: student.fau.edu/jchen8/web/papers/surveybookchapter.pdf
  7. Sonia Boora, Yogesh Kumar, Bhawna Kochar, “A Survey on Security Issues in Mobile Ad-Hoc Networks”, International Journal of Computer Science & Management Studies, Vol. 11, Issue 02, August 2011.
Index Terms

Computer Science
Information Sciences

Keywords

DOS RREQ AODV WEP