Volume 21 No 3 (2023)
 Download PDF
Gaurav D Saxena, Dr.Dinesh G, Dr. D. Stalin David, Mohit Tiwari, Tripti Tiwari, Dr. M. Monisha, Dr. Amit Chauhan
An ad-hoc network, also called a mobile or wireless local area network (WLAN), uses a dynamic structure in which nodes are connected without the need for any fixed infrastructure. These networks can be setup anywhere, and often consist of individual devices such as smart phones that are roaming together to form a larger network. What is the name for this type of networking? The term "mobile ad-hoc network" (MANET) is typically used to describe these types of networks that involve Mobile Hosts. One of the biggest challenges in designing a networked system is maintaining communication between nodes. This can be difficult because nodes are often randomly located, and they may join or leave the network at any time. Because MANETs rely on this decentralized structure, they are more vulnerable to ttacks than wired networks. As a result, security becomes an important concern for the network—and it is essential that messages be sent securely so that communications remain uninterrupted. In this paper, we have surveyed attacks that can occur at the network layer of a protocol stack in MANETs. The aim of our work was to provide an overview of all types of attack on networks layer on MANET Protocol stacks, which will help us better understand how these attacks may be applicable to MANETs. We hope that by doing so, we will be able to classify all such attacks and identify any potential weaknesses or vulnerabilities in protocols used for networking within MANETS.
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.