A Study on Network Security attacks on ad hoc wireless networks

  • Unique Paper ID: 148357
  • Volume: 6
  • Issue: 1
  • PageNo: 415-419
  • Abstract:
  • Attacks on ad hoc wireless networks can be classified into two broad categories, namely, passive and active attacks. A passive attack does not disrupt the operation of the network; the adversary snoops the data exchanged in the network without altering it. Here, the requirement of confidentiality can be violated if an adversary is also able to interpret the data gathered through snooping. Detection of passive attacks is very difficult since the operation of the network itself does not get affected. One way of overcoming such problems is to use powerful encryption mechanisms to encrypt the data being transmitted, thereby making it impossible for eavesdroppers to obtain any useful information from the data overheard.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{148357,
        author = {Dr. R. Madhanmohan},
        title = {A Study on Network Security attacks on ad hoc wireless networks},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {6},
        number = {1},
        pages = {415-419},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=148357},
        abstract = {Attacks on ad hoc wireless networks can be classified into two broad categories, namely, passive and active attacks. A passive attack does not disrupt the operation of the  network;  the  adversary  snoops the data exchanged in the network without  altering  it.  Here,  the  requirement  of confidentiality  can be violated if an adversary is  also  able  to  interpret  the  data gathered  through snooping. Detection of passive attacks is very difficult since the operation of the network itself does not get affected. One way of overcoming  such problems  is  to use powerful encryption mechanisms to  encrypt  the  data  being  transmitted, thereby making it impossible for eavesdroppers to obtain any useful  information from the data overheard.},
        keywords = {},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 6
  • Issue: 1
  • PageNo: 415-419

A Study on Network Security attacks on ad hoc wireless networks

Related Articles