Emerging Trends in Computing |
Foundation of Computer Science USA |
ETC2016 - Number 1 |
March 2017 |
Authors: Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao |
720e7baf-2a60-495d-994a-251bff6b9cd6 |
Joshua Reginald Pullagura, Perala.srikanth, D.venkata Rao . Attacks on Mobile Ad hoc networks: A Survey. Emerging Trends in Computing. ETC2016, 1 (March 2017), 1-2.
In recent years Wireless technology iswidely used with the advent of IEEE 802 standard. Lowrate Wireless personal area networks are widely usedbecause of low cost. A mobile ad-hoc network isinfrastructure less network which consist of mobile devices connected wirelesslyand usually move to other places from time totime, move around or join the network. Over the pastyears simulation work has been carried out to achievereliable routing protocol for IEEE 802 standard. The Wireless sensor and ad hoc networks are easily prone to security attacks, once deployed these networks are prone to be attacked and are unprotected. This paper mainly concentrates on various attacks that degrade the network performance. Attacks on the node degrade systemperformance, especially during the route discovery process by malicious entities which results in data loss and slower the network speed. In this paper various security threats will be discussed extensively.