Volume 21 No 3 (2023)
Download PDF
ADDRESSING THE DISTINCT SECURITY VULNERABILITIES TYPICALLY EMERGE ON THE MOBILE AD-HOC NETWORK LAYER
Gaurav D Saxena, Dr.Dinesh G, Dr. D. Stalin David, Mohit Tiwari, Tripti Tiwari, Dr. M. Monisha, Dr. Amit Chauhan
Abstract
An ad-hoc network, also called a mobile or wireless local area network (WLAN), uses a
dynamic structure in which nodes are connected without the need for any fixed infrastructure.
These networks can be setup anywhere, and often consist of individual devices such as smart
phones that are roaming together to form a larger network. What is the name for this type of
networking? The term "mobile ad-hoc network" (MANET) is typically used to describe these
types of networks that involve Mobile Hosts. One of the biggest challenges in designing a
networked system is maintaining communication between nodes. This can be difficult
because nodes are often randomly located, and they may join or leave the network at any
time. Because MANETs rely on this decentralized structure, they are more vulnerable to ttacks than wired networks. As a result, security becomes an important concern for the
network—and it is essential that messages be sent securely so that communications remain
uninterrupted. In this paper, we have surveyed attacks that can occur at the network layer of a
protocol stack in MANETs. The aim of our work was to provide an overview of all types of
attack on networks layer on MANET Protocol stacks, which will help us better understand
how these attacks may be applicable to MANETs. We hope that by doing so, we will be able
to classify all such attacks and identify any potential weaknesses or vulnerabilities in
protocols used for networking within MANETS.
Keywords
.
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.