Open Access Open Access  Restricted Access Subscription Access

Malicious Attacks in Ad Hoc Networks-Detection & Protection


Affiliations
1 Department of Computer Science & Engineering Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, India
 

Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being a recent technological development, are mainly being used in space, military and other security-sensitive operations, but their unique properties are fast extending their applications to industrial and commercial fields also. The biggest challenge that we face in design and application of these networks is that these are quite prone to security attacks. In the present work, we try to unravel the various attacks an ad hoc network can encounter and how to protect the network from these. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to make secure the communication secure. A mechanism is evolved where we capitalize on the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend data from any malicious attacks. Replication and coding techniques are also used to enhance the security of the network.


User
Notifications
Font Size

Abstract Views: 111

PDF Views: 0




  • Malicious Attacks in Ad Hoc Networks-Detection & Protection

Abstract Views: 111  |  PDF Views: 0

Authors

Gurnitika Kaur
Department of Computer Science & Engineering Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, India
Khyati Marwah
Department of Computer Science & Engineering Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, India

Abstract


Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being a recent technological development, are mainly being used in space, military and other security-sensitive operations, but their unique properties are fast extending their applications to industrial and commercial fields also. The biggest challenge that we face in design and application of these networks is that these are quite prone to security attacks. In the present work, we try to unravel the various attacks an ad hoc network can encounter and how to protect the network from these. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to make secure the communication secure. A mechanism is evolved where we capitalize on the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend data from any malicious attacks. Replication and coding techniques are also used to enhance the security of the network.