International Journal of Computer Applications
Wireless networks are becoming more and more popular nowadays. These are widely used because they are easy to deploy. As these networks are essentially decentralized in nature they enhance the resource sharing and collaboration. The anonymous and open nature of system offers an almost ideal environment for unauthorized access of resources and also prone to different attacks in the network. These systems have to challenge the attacks like man-in-the-middle, replay and Denial of Service (DoS) attacks by anonymous malicious peers. So these systems have to protect themselves from these malicious nodes.