Download now Free registration required
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. So many approaches are proposed for Ad-Hoc Networks for dealing with various attacks. Trust based mechanism coupled with Ad Hoc Networks based Intrusion Detection System (IDS) is one approach which can ensure the security services required by users. There are many attacks in Ad Hoc Networks like availability, integrity, authentication, confidentiality and non-repudiation. This paper discusses Availability Attacks like Black hole and Selfishness.
- Format: PDF
- Size: 82.9 KB