Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Network Security in Mobile AD-HOC Network (MANET)


Affiliations
1 Department of Electronics and Communication Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
2 Department of Electronics and Communications Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
3 Department of Electrical and Electronics Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
     

   Subscribe/Renew Journal


Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the authorisation credentials to participate in the mobile ad hoc network. Internal nodes giving rise to threats can be further divided according to their behaviour — failed, badly failed, selfish and malicious nodes. Failed and selfish nodes are those which do not perform certain operations that the protocol spec- ifies that they should, the former due to some unfore seen failure and the latter due to selfishness to conserve power. Badly failed nodes may perform operations incorrectly, introducing false and misleading information into the network. Malicious nodes may deliberately disrupt the network using a variety of attacks. All categories of node behaviour should be considered when designing protocols for mobile ad hoc networks.

Keywords

Security Vulnerabilities, Routing.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 165

PDF Views: 1




  • Network Security in Mobile AD-HOC Network (MANET)

Abstract Views: 165  |  PDF Views: 1

Authors

R. Vassoudhevan
Department of Electronics and Communication Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
R. Sivagami
Department of Electronics and Communications Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
Z. Saffna Sarmilla
Department of Electronics and Communication Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India
R. Divya
Department of Electrical and Electronics Engineering, E.G.S.Pillay Engineering College, Nagapattinam, India

Abstract


Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the authorisation credentials to participate in the mobile ad hoc network. Internal nodes giving rise to threats can be further divided according to their behaviour — failed, badly failed, selfish and malicious nodes. Failed and selfish nodes are those which do not perform certain operations that the protocol spec- ifies that they should, the former due to some unfore seen failure and the latter due to selfishness to conserve power. Badly failed nodes may perform operations incorrectly, introducing false and misleading information into the network. Malicious nodes may deliberately disrupt the network using a variety of attacks. All categories of node behaviour should be considered when designing protocols for mobile ad hoc networks.

Keywords


Security Vulnerabilities, Routing.