Up

Security Techniques of Mobile Ad hoc Networks: A Review

File Size:
1.24 MB
Volume:
Volume 4, Issue 4 (April, 2018)
Publication No:
IJTC201804003
Author:
Navjotpreet Kaur, Er. Maninder Kaur
Downloads:
6 x

Abstract:
The networks that do not have any central controller that is also known as access points within them are known as the infrastructure-less networks. They are also called the ad hoc networks and are decentralized types of networks. A routing protocol utilized within the mobile ad hoc networks and many wireless ad hoc networks is known as the reactive routing protocol. The black hole attack is the active type of attack which is trigger by the malicious node to reduce network performance.

Keywords:
MANET, Byzantine attack, Worm Hole Attack, Rushing Attack, Eaves dropping.