ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review On Wireless Adhoc Network Security

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.2, No. 6)

Publication Date:

Authors : ; ;

Page : 1632-1635

Keywords : ds: Wireless Network; Security; Adhoc Network.;

Source : Downloadexternal Find it from : Google Scholarexternal


Emergence of wireless networks in 21th has redefined the networks which were seen in previous century. Initially there were no system networks so they were all secure .The data kept in a standalone system was totally safe, except an attacker gets the right to access the particular system. As there was a need occurred to connect to other systems, the complexity increased and the data kept in a system got more vulnerable because to transfer it from one system there was a need of some cable medium the data got some threat from outsiders because they got some more space to do their hacking task. They can now manipulate the data passing through a medium, also they could try to remove data from the channel, or they can mislead others with wrong information. But the whole 20th century was more peaceful then of now because of comparatively less systems connected as of now. In this century, in fact, from the last decade of 20 century, the systems grew rapidly due to the popularity of internet, and growing need of the people to transfer data from one system to another, now this is the age of mobilization and every person needs information on his hands instantly. People need networking with mobility, which has given growth to wireless systems so that they can enjoy while moving and the mobility doesn’t disrupt the networking benefits. This has led to the growth to wireless systems; almost half of the world’s systems are now wirelessly connected to each other as our laptops, wireless enabled desktops, mobile phones, sensor nodes etc. Facilities have grown immensely but also there is an increase in threat level; now an attacker has more points to intrude our information, everything is less secure than before. So there is a need to check the security features of our networks and an enhancement to them so that they are more secure to any attack. In this paper we try to bring the attack types and some prevention to save us from any attack.

Last modified: 2014-10-28 22:25:59