Abstract

These days, Ad Hoc Networks are in demand in some crucial applications due to their open architecture and the mobility feature. Here, nodes cooperate with each other for communication. This very characteristic poses an immense problem in Ad Hoc Networks from the Security Point of view. Also due to the lack of Central Administration, Ad Hoc Networks fall prey to the Insider Attacks. Implementation of good Intrusion Detection Systems are ideal for insider attacks. For developing highly efficient intrusion detection system, it is mandatory to understand the effect of attacks on performance of Ad Hoc networks. In this paper we discuss general overview of wireless ad hoc networks, survey of various attacks and analysis of effects of black hole attack, dropping route request attack and Route Request flooding attacks on Ad Hoc networks. The ns-2 simulator was used for simulation of various attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call