A Review on Impersonation Attack in Mobile Ad-Hoc Network

  IJCTT-book-cover
 
International Journal of ComputerTrends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-8 Number-1                          
Year of Publication : 2014
Authors : Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar
DOI :  10.14445/22312803/IJCTT-V8P107

MLA

Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar. "A Review on Impersonation Attack in Mobile Ad-Hoc Network ". International Journal of Computer Trends and Technology (IJCTT) 8(1):34-37, February 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.

References
[1] Aakansha Jain, Khushboo Sawant “Effect of Impersonation Attack on Mobile Ad Hoc Network” Indian Journal of Research,2(3), March 2013, 17-19.
[2] Michel Barbeau, Jyanthi Hall and Evangelos Kranakis “Detecting Impersonation Attacks in Future Wireless and Mobile Networks” Natural Sciences and Engineering Research Council of Canada
[3]LathaTamilselvan and Dr. V. Sankaranarayanan “Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks”International Journal of Computer Science and Network Security, 7(3), March 2007, 118-123.
[4] Tahira Farid and Anitha Prahladachar “Secure Routing with AODV Protocol for Mobile Ad Hoc Networks “ University of Windsor.
[5] Preeti Bathla, Bhawna Gupta “Security Enhancements in AODV Routing Protocol” International Journal of Computer Science and Technology Vol. 2, june 2011,295-298.

Keywords
MANET, Impersonation attack, Risk analysis.