MANET
Wednesday, 7 November 2012
MANET Attacks:
Attack:
An attack is nothing but that disrupts the normal network operation.
1.Passive attacks are those, launched by the adversaries solely to snoop the data exchanged in the network. These adversaries in any way don’t disturb the operation of the network. Such attacks identification becomes very difficult since network itself does not affected and they can reduced by using powerful encryption techniques
Example: Snooping, eavesdropping, traffic analysis, monitoring
2.Active attack tries to alter or destroy the information that is being exchanged, thereby disturbing the normal functionality of the network.
Example:Wormhole, black hole, gray hole, byzantine, information
disclosure, resource consumption, routing attacks
Explanation for Routing Protocol
Proactive routing protocols: In proactive protocols, the routes are discovered before usage in order to avoid the latency incurred in finding the route. These protocols require the nodes to maintain routing and network topology information through one or more tables. Any change in the network needs to be reflected in these tables by propagating the changes throughout the network. Examples of this class include DSDV, WRP.
Reactive routing protocols: Reactive protocols try to conserve the precious battery power of the nodes by discovering routes only when it is required. Only when there is a packet to be transferred, the route discovery protocol is initiated by the source and the route is found. Because of this nature, this class of routing protocols is also called as “Dynamic routing protocols”. Examples of this class include DSR, AODV and ABR.
Hybrid protocols: Hybrid protocols make use of both reactive and proactive approaches. They typically offer means to switch dynamically between the reactive and proactive parts of the protocol. Examples of this class include TORA and ZRP.
Sunday, 28 October 2012
What is MANET ?
.jpg)
Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks.
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
Subscribe to:
Posts (Atom)