eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35

A News Letter Sign UP!
Security Issue related to the Adhoc Network - A Review

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.1 Issue 1, pp 17-20,Year 2012

SECURITY ISSUE RELATED TO THE ADHOC NETWORK - A REVIEW

Sonu Kumar, Ajay Kumar Singh, Seema Rani

Correspondence should be addressed to :

Received : 01 June 2012; Accepted : 15 June 2012 ; Published : 30 June 2012

Share
Download 127
View 179
Article No. 10003
Abstract

Adhoc network ai type of warless network that is used for mobile computing. Mobile ad hoc networks (MANET) have been generally regarded as the most popular network model for group communication. However, the security deployment for MANET operations is knotty. The traditional system not provide the solution that can be applied to work as adhoc network. These are mostly due to resource poorness of these networks. For temporary establishment of network adhoc network is used. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it easier to suffer from attacks than traditional wired network. Many type of attack can be deployed on this network. wormhole is the type of attack that can be break the security of the adhoc network. The paper deal with the wormhole attack on the adhoc network.

Key Words   
Ad hoc network, leashes, routing, wormhole
Copyright
References
  1. Yongguang Zhang, Wenke Lee ,“Intrusion detection in Wireless Ad-hoc  ”
  2. Zhou ,Z.J Haas ,“Securing Ad-hoc Networks”.
  3. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in  Book  The  Handbook  of  Ad  Hoc  Wireless  Networks (Chapter 30), CRC Press LLC, 2003.
  4. hu A. Perrig and D. Johnson , Packet Leashes: A Defense against Wormhole Attacks   in Wireless Ad Hoc Networks, in Proceedings of IEEE INFOCOM’03, 2003
  5. Ad hoc networks from Wikipedia, the free encyclopedia
  6. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.
  7. Mehdi Khosrow, “Encyclopedia   of   Information   Science   and Technology”,Second Edition, volume 5.
  8. Arun Kumar   Bayya,   Siddhartha   Gupte  ,“Security   in   Ad-hoc Networks”.
  9. Asokan, Philip Ginzboorg “Key Agreement in Ad-hoc Networks”. [10]   Michael  Steiner,  Gene  Tsudik,  Michael  Waidner,  IEE  Computer Society, “Key Agreement in Dynamic Peer Groups”.
To cite this article

Sonu Kumar, Ajay Kumar Singh, Seema Rani , " Security Issue Related To The Adhoc Network - A Review ", International Journal of Latest Research in Science and Technology . Vol. 1, Issue 1, pp 17-20 , 2012


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.