A Review on Impersonation Attack in Mobile Ad-Hoc Network

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.

Authors and Affiliations

Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar

Keywords

Related Articles

A Procedural Performance Comparison of Soft Thresholding Techniques for Medical Image Denoising

It is still a challenging problem for researchers to remove noise from medical image. To remove Noise from the images is not easy. Several algorithms are published and each approach has its advantages, and limitations. T...

Secure Similarity Search on Outsourced Metric Data

Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the adv...

Effective User Navigation in Dynamic Website

Constructing a well structured website to aide or assist user navigation are the problem now a days .A main primary cause is that web developers may understanding of how a web site should be design can be different from...

Comprehensive Study of Impact of Requirement Engineering Processes on Rework

21st century has seen many technological developments. One of the industries which have seen tremendous developments is Software Development industry. Lot of research has been done in the field of software engineering to...

A Puzzle Based Authentication Scheme for Cloud Computing

This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...

Download PDF file
  • EP ID EP157669
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar (2014). A Review on Impersonation Attack in Mobile Ad-Hoc Network. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 8(1), 34-37. https://europub.co.uk./articles/-A-157669