Computer Science – Networking and Internet Architecture
Scientific paper
2011-11-17
Computer Science
Networking and Internet Architecture
11 Pages, 8 Figures
Scientific paper
Security in mobile AD HOC network is a big challenge as it has no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside the network and from the outside. We are trying to classify the existing attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. We will also be discussing the presently proposed methods of mitigating those attacks.
Banerjee Arnab
Bhattacharya Debika
Bhattacharyya Aniruddha
Bose Dipayan
Saha Himadri Nath
No associations
LandOfFree
Different types of attacks in Mobile ADHOC Network does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Different types of attacks in Mobile ADHOC Network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Different types of attacks in Mobile ADHOC Network will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-349870