ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Malicious Attacks in Ad Hoc Networks - Detection & Protection

Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.2, No. 9)

Publication Date:

Authors : ;

Page : 884-891

Keywords : ad hoc networks; security-sensitive operations;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being a recent technological development, are mainly being used in space, military and other security-sensitive operations, but their unique properties are fast extending their applications to industrial and commercial fields also. The biggest challenge that we face in design and application of these networks is that these are quite prone to security attacks. In the present work, we try to unravel the various attacks an ad hoc network can encounter and how to protect the network from these. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to make secure the communication secure. A mechanism is evolved where we capitalize on the inherent redundancy in ad hoc networks ? multiple routes between nodes ? to defend data from any malicious attacks. Replication and coding techniques are also used to enhance the security of the network.

Last modified: 2013-09-03 20:28:28