Abstract | ||
---|---|---|
Security in mobile AD HOC network is a big challenge as it has no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside the network and from the outside. We are trying to classify the existing attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. We will also be discussing the presently proposed methods of mitigating those attacks. |
Year | Venue | Field |
---|---|---|
2011 | CoRR | Mobile ad hoc network,Data traffic,Computer security,Wi-Fi Protected Setup,Computer science,Network security,Computer network,Wireless ad hoc network |
DocType | Volume | Citations |
Journal | abs/1111.4090 | 0 |
PageRank | References | Authors |
0.34 | 12 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Aniruddha Bhattacharyya | 1 | 2 | 0.74 |
Arnab Banerjee | 2 | 123 | 6.96 |
Dipayan Bose | 3 | 2 | 0.74 |
Himadri Nath Saha | 4 | 3 | 2.10 |
Debika Bhattacharyya | 5 | 50 | 16.68 |