Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
www.assignmentwritingindia.com

www.assignmentwritingindia.com

Ratings: (0)|Views: 1,299 |Likes:
Published by professionalwriters
Assignment Writing Content Services India US, UK, Australia, UAE, Dubai, Canada, Germany, Ireland, Scotland, London, Bangalore, Chennai, Pune, Delhi, Mumbai, Hyderabad, Gujarat, Punjab, Noida, Calcutta, Kerela, Mysore, Trivandrum, Ahmedabad, Andhra Pradesh, Secunderabad

Contact: +91 9502564793, +91 9291394133
contact.professionalwriters@gmail.com
www.assignmentwritingindia.com
Assignment Writing Content Services India US, UK, Australia, UAE, Dubai, Canada, Germany, Ireland, Scotland, London, Bangalore, Chennai, Pune, Delhi, Mumbai, Hyderabad, Gujarat, Punjab, Noida, Calcutta, Kerela, Mysore, Trivandrum, Ahmedabad, Andhra Pradesh, Secunderabad

Contact: +91 9502564793, +91 9291394133
contact.professionalwriters@gmail.com
www.assignmentwritingindia.com

More info:

Categories:Types, Brochures
Published by: professionalwriters on Dec 06, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX or read online from Scribd
See more
See less

07/10/2013

 
 
Attacks and Counter Measures in Mobile Ad HocNetwork 
www.assignmentwritingindia.com
 
 
 
   O  c   t  o   b  e  r   1   5 ,   2   0   1   0 
www.assignmentwritingindia.com
 
Abstract
Security can be considered as major focal point in providing service for wireless and the wirednetworks. The accomplishment of MANET mainly relies on the individuals in its security.MANETs are becoming more accepted as of mobile handsets find their way to the public, besides traditional such as military battle fields and disaster situations they are being used moreand more in day to day situations due to their flexibility and independence of network infrastructure. With rapid increase in the usage of Manet¶s need of security is essential asconcept and nature of MANETs make them prone to various attacks using different techniques.Mainly in MANETs routing attacks are particularly serious. The paper mainly focuses on sdifferent routing attacks on the Mobile Ad Hoc Networks and counter measures of attacks to protect network and to achieve purpose of taking security authentication and restricted accesscontrol.
 
 
   O  c   t  o   b  e  r   1   5 ,   2   0   1   0 
www.assignmentwritingindia.com
 
Contents
Abstract ...................................................................................................................................... 2
 
I
ntroduction ................................................................................................................................ 5
 
2. Protocols of Routing for MANET ........................................................................................... 6
 
Routing protocols .................................................................................................................... 6
 
On Demand-Driven Protocols ................................................................................................. 6
 
Routing Attacks in MANET........................................................................................................ 7
 
Flooding attack ....................................................................................................................... 7
 
Black hole attack ..................................................................................................................... 8
 
Link spoofing attack................................................................................................................ 9
 
Wormhole attack ................................................................................................................... 11
 
4. Security Goals ...................................................................................................................... 12
 
Availability ........................................................................................................................... 12
 
Confidentiality ...................................................................................................................... 12
 
I
ntegrity ................................................................................................................................ 12
 
Authentication....................................................................................................................... 13
 
 Non-repudiation .................................................................................................................... 13
 
Challenges ............................................................................................................................ 13
 
Scope and roadmap ............................................................................................................... 14
 
Security Mechanism.................................................................................................................. 14
 
Preventive mechanism: ......................................................................................................... 15
 
Reactive mechanism: ............................................................................................................ 15
 
5. Network Layer Defense ........................................................................................................ 15
 
Conclusions .............................................................................................................................. 17
 

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->