You are on page 1of 1

1. Introduction MOBILE Ad hoc network is a new paradigm of wireless communication for mobile hosts, or we can say nodes.

Network which support the ADHOC architecture known as Mobile ADHOC Network.The nodes are self forming in nature. Typically the nodes are quickly assembled without human intervention in practical applications.On the basis of wireless links and mobility in nature,the nodes may loose connectivity with other nodes inside a network. It is infrastructure less means there is no base stations or mobile switching centers or access points. A Mobile AdHoc Network (MANET) is a self configuring mobile nodes. This is different from any wireless network. If we consider only a stand-alone MANET then it has limited applications, because the connectivity is limited to itself. But, in case of global connectivity,it adds new security threats to the existing active and passive attacks on MANET. Each MANET device is free to move independently, in any arbitrary direction, and thus each device will potentially change its link to other devices on a regular basis[1][2]. The primary challenge is to maintain the information to route the packets between nodes properly.Most of this types of networks assume to be a cooperative or friendly network.The number of attacks is more,without knowing that,friendly node or malicious nodes.Routing also the most challenging aspect in this architecture because the typical routing protocol dont manage the mobility of nodes efficiently because of mobility,inter network connectivity,and overhead is also huge. Attacks can be broadly classified in two categories : ACTIVE and PASSIVE. PASSIVE means attacks is sniffing or listening the information inside a network without actively putting its existence, but in case of active attack, the attacker act as a malicious node,performing malicious activity and changing the information of route or disrupt the network connectivity. Any network must have some vulnerability which helps the attacker to attack or disrupt the normal communication or data flow.Means any flaw which present in hardware or in software,telling the system is open to the attackers. So a security mechanism should be implemented to secure the system from threats & attacks.

You might also like