Security Considerations in Manets using Cryptography Primitives

Download Now
Provided by: International Journal for Development of Computer Science & Technology (IJDCST)
Topic: Security
Format: PDF
Adversary disrupts victim's communication channels through jamming in wireless ad hoc network governed by reactive protocols. Attack models are classified as both internal and external with more strategy employed in external and internal has several disadvantages. Firstly, adversary have to be expand a significant amount energy to frequency bands of interest, and then secondly continuous presence of unusual high interference levels makes the attacks presented for detecting attacks. An internal attack model is an adversary that is assumed to be aware of network secret implementation details of network protocols in any layer present in the network stack.
Download Now

Find By Topic