A Survey on Safety Intimidations in Mobile Ad-Hoc Networks

Notice: Undefined variable: link_article in /home/ijtc/public_html/plugins/content/bt_socialshare/bt_socialshare.php on line 818

Notice: Undefined property: stdClass::$image in /home/ijtc/public_html/plugins/content/bt_socialshare/bt_socialshare.php on line 818

Notice: Undefined variable: title in /home/ijtc/public_html/plugins/content/bt_socialshare/bt_socialshare.php on line 818

Notice: Undefined offset: 1 in /home/ijtc/public_html/plugins/content/bt_socialshare/bt_socialshare.php on line 820
File Size:
1.12 MB
Volume 3, Issue 7 (July, 2017)
Publication No:
Sukhwant Singh, Farminder Singh

Notice: Undefined variable: pdFileDate in /home/ijtc/public_html/components/com_phocadownload/views/file/tmpl/default.php on line 277
10 x

A Mobile Ad Hoc Network is a self-configuring network and they are very impressive for army infrastructures in aggressive battlefield environments. In such conditions, the capability to interconnect secret information effectively in the existence of attacker is very tough. Attackers may challenge both passive and active type of attacks in addition to non-authorized access to categorize, adjust or disturb the information process. Nodes generally share the same physical media; they transmit signals and acquire them at the same occurrence band. This paper put light on various security threats and their hazards in mobile ad-hoc networks.

Ad-hoc networks, attacks, protocols

Tags Associated: Adhoc Network Attacks Protocols