A Comparitative Survey on Malicious Nodes and Their Attacks in MANET

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: The designation of the mobile ad hoc networks (MANET) is, particularly to build up a dynamic wireless network, which has no antecedent and strictly defined infrastructure, within areas with limited or no available organized infrastructure, is possible for the parties to participate in MANET - authentic network users additionally as malicious attackers. This fact certainly raises the question regarding the protection. In this work we tend to concentrate on the common attacks within MANET, that differ in their essence like Sleep Deprivation attack, DoS etc. and what can be done as to stop them.

Authors and Affiliations

Ruchi Aggarwal , Simmy Rana

Keywords

Related Articles

 Face Recognition using Radial Basis Neural Network

Abstract: In this paper, we propose four techniques for extraction of facial features namely PCA, LDA, KPCA and KFA. The purpose of face feature extraction is to capture certain discriminative features that are unique fo...

 Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks

 Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...

A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography

Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. U...

 An Effective Solution to Adequate and Operative Duplicate Detection in Stratified Data

 Abstract: Data Mining is considered as a nontrival extraction of implicit, previously unknown and potentially usefull information from data. Although there is a long line of work on identifying duplicates in relati...

 Research on Clustering Method of Related Cases BasedOn Chinese Text

 Abstract: With the movement of population, crimes are showing mobility and professionalism characteristics,the cases which the same suspects committed have the same or similar characteristics, it is helpful to find...

Download PDF file
  • EP ID EP162843
  • DOI 10.9790/0661-163793101
  • Views 98
  • Downloads 0

How To Cite

Ruchi Aggarwal, Simmy Rana (2014).  A Comparitative Survey on Malicious Nodes and Their Attacks in MANET. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 93-101. https://europub.co.uk./articles/-A-162843