Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i14/84433
Year: 2016, Volume: 9, Issue: 14, Pages: 1-10
Original Article
K. Vijayakumar1*and K. Somasundaram2
1Department of Computer Science Engineering, Karpagam University, Coimbatore – 641021, Tamil Nadu, India; [email protected] 2Department of Computer Science and Engineering, Vel Tech High Tech Dr. RR Dr. SR Engineering College, Chennai - 600062, Tamil Nadu, India; [email protected]
*Author of Corresponding: K. Vijayakumar Department of Computer Science Engineering, Karpagam University, Coimbatore – 641021, Tamil Nadu, India; [email protected]
Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless networking like MANET’s (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks like attacks on modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are analysed for prevention, detection and reaction on various attacks by malicious nodes. The study of this article has examined the methodologies meant for fathoming the implementation issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time, packet transmission ratio, systems or nodes security and administration. Conclusion: This article presents a comparison table specifying that every protocol provides security only to a limited access. Thus, there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols for security issues of MANET.
Keywords: Attacks, Detection, Malicious Nodes, Network Layer, Prevention, Protocols, Security, Throughput
Subscribe now for latest articles and news.