SlideShare a Scribd company logo
Study Of Security 
Attacks In MANET 
11BCE111 
KUNAL PRAJAPATI
Mobile Ad-Hoc Network 
Mobile Ad-Hoc Network is collection of mobile nodes 
which forms temporary network. 
In Mobile Ad-Hoc Network node communicate in peer 
to peer fashion. 
 Nodes in MANET play both role of router and 
terminal, 
It is decentralized type of Wireless network. 
It is self organizing network without need of fixed 
network infrastructure and hence have dynamic 
network topology.
Mobile Ad-Hoc Network 
Communication between nodes in Mobile Ad-Hoc 
Network network via radio communication. 
Mobile Ad-Hoc Network supports anytime and 
anywhere. 
In general routes between nodes in an Mobile ad-hoc 
network may include multiple hops and call such 
network as multi-hop Mobile ad-hoc network. 
It reduced Administrative cost.
Application of MANET 
Mobile Ad-Hoc Network can increase mobility and 
flexibility, as Mobile ad-hoc networks can be brought 
up and torn down in a very short time. 
Mobile Ad-Hoc Network can be more economical in 
some case, as they eliminate fixed infrastructure 
costs and reduces power consumption at mobile 
nodes. 
Mobile Ad-Hoc network can be more robust then 
conventional wireless network because of their non-hierarchical 
distributed control and management 
mechanisms.
Vulnerability of MANET 
Dynamic Topology 
Wireless Links 
Cooperativeness 
Lack of clear line of defence 
Limited resources
Threat Model 
Identify the Security Objectives 
Identify the application overview 
Decompose Application 
Identify Threat 
Identify Vulnerability
Attacks on Mobile Ad-Hoc Network 
Attacks on Mobile ad-hoc network can be classified 
as active attacks or passive attacks. depending on 
normal operation of network disrupted or not. 
Passive Attack 
Passive attacks is difficult to detect because of this 
attacks normal operation of network is not affected. 
This attack target confidentiality attribute of the 
system. 
Attacker snoops the data exchanged in network 
without altering it.
Attacks on Mobile Ad-Hoc Network 
Active Attack 
In active attacks the intruders can modify the 
packet,inject the packets, drops the packets. 
It may disrupts the normal operation of the 
network. 
It confuses routing procedure and degrades network 
performance.
Attacks on Ad-Hoc Network 
Active Attack is classified as External Attack and Internal 
Attack. 
External Attack 
Carried out by nodes that do not belong to the domain 
of the network. Such attacks can be defended by using 
source an Authentication, firewalls and encryption. 
Internal Attack 
Internal Attacks are from Compromised nodes which are 
actually part of network.
Attacks at Routing layer 
Black Hole Attack 
Worm Hole Attack 
Resource Consumption Attack 
Rushing Attack 
Routing Table Poisoning 
Sybil attack
Attacks at Routing layer 
Replay Attack 
Sink Hole Attack 
Link With Holding & Link Spoofing Attacks
Black Hole Attack
Thank 
You 
::GUIDED BY:: 
PROF. PARITA OZA

More Related Content

PPTX
Security Issues in MANET
PPT
Security in mobile ad hoc networks
PPT
Mobility management in adhoc network
PPTX
Security issues in manet
PPT
Wireless Sensor Networks
PPTX
Adhoc Wireless Network
PPTX
Basics of Wireless sensor networks
PPTX
Routing in Wireless Sensor Networks
Security Issues in MANET
Security in mobile ad hoc networks
Mobility management in adhoc network
Security issues in manet
Wireless Sensor Networks
Adhoc Wireless Network
Basics of Wireless sensor networks
Routing in Wireless Sensor Networks

What's hot (20)

PPT
PPT
Mobile Computing UNIT-I TO III
PDF
Location Aided Routing (LAR)
PPTX
Data aggregation in wireless sensor networks
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PPT
Wireless routing protocols
PPTX
Ch 18 intro to network layer - section 3
PPT
Attacks in MANET
PDF
EC8702 adhoc and wireless sensor networks iv ece
PPTX
Wireless Sensor Network Routing Protocols
PDF
Unsupervised Learning in Machine Learning
PPTX
MANET in Mobile Computing
PPTX
WIDE AREA NETWORK
PPTX
ADhoc- network overview,application,issues.
PPTX
IV UNIT PPT (1).pptx
PPTX
wireless sensor network
PPTX
Manet ppt
PPTX
Contention based MAC protocols
PDF
Lecture 19 22. transport protocol for ad-hoc
Mobile Computing UNIT-I TO III
Location Aided Routing (LAR)
Data aggregation in wireless sensor networks
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Wireless routing protocols
Ch 18 intro to network layer - section 3
Attacks in MANET
EC8702 adhoc and wireless sensor networks iv ece
Wireless Sensor Network Routing Protocols
Unsupervised Learning in Machine Learning
MANET in Mobile Computing
WIDE AREA NETWORK
ADhoc- network overview,application,issues.
IV UNIT PPT (1).pptx
wireless sensor network
Manet ppt
Contention based MAC protocols
Lecture 19 22. transport protocol for ad-hoc
Ad

Viewers also liked (12)

PPTX
Various Security Attacks in mobile ad hoc networks
PPTX
Wormhole attack
PPTX
MANET
PDF
Attacks on mobile ad hoc networks
PPT
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
PDF
Lecture 9 10 .mobile ad-hoc routing protocols
PPT
Routing in Manet
PPTX
Ad-Hoc Networks
PPTX
Mobile Ad hoc Networks
PPSX
Literature review in research
PDF
AODV protocol and Black Hole attack
Various Security Attacks in mobile ad hoc networks
Wormhole attack
MANET
Attacks on mobile ad hoc networks
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Lecture 9 10 .mobile ad-hoc routing protocols
Routing in Manet
Ad-Hoc Networks
Mobile Ad hoc Networks
Literature review in research
AODV protocol and Black Hole attack
Ad

Similar to Study of security attacks in manet (20)

PPT
Presentation.pptx
PDF
A Review Paper on Network Layer attacks in MANETs
PPTX
Rm presentation on research paper
PDF
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
PPTX
Abdullah Mukhtar ppt
PPTX
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
PDF
Security in manet via different intrusion detection techniques
DOC
A table driven search approach for revelation and anticipation of sinkhole at...
DOC
A table driven search approach for revelation and anticipation of sinkhole at...
PDF
A Review on various Security Attacks in Mobile Adhoc Network
PDF
Manet Security Breaches : Threat to A Secure Communication Platform
PDF
A Review Security Issues In Mobile Ad Hoc Network
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PDF
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)
PPTX
PDF
T04506110115
PDF
An Overview of security issues in Mobile Ad hoc Networks
PDF
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
PDF
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
Presentation.pptx
A Review Paper on Network Layer attacks in MANETs
Rm presentation on research paper
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Abdullah Mukhtar ppt
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
Security in manet via different intrusion detection techniques
A table driven search approach for revelation and anticipation of sinkhole at...
A table driven search approach for revelation and anticipation of sinkhole at...
A Review on various Security Attacks in Mobile Adhoc Network
Manet Security Breaches : Threat to A Secure Communication Platform
A Review Security Issues In Mobile Ad Hoc Network
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Performance analyses of wormhole attack in Cognitive Radio Network (CRN)
T04506110115
An Overview of security issues in Mobile Ad hoc Networks
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...

Study of security attacks in manet

  • 1. Study Of Security Attacks In MANET 11BCE111 KUNAL PRAJAPATI
  • 2. Mobile Ad-Hoc Network Mobile Ad-Hoc Network is collection of mobile nodes which forms temporary network. In Mobile Ad-Hoc Network node communicate in peer to peer fashion.  Nodes in MANET play both role of router and terminal, It is decentralized type of Wireless network. It is self organizing network without need of fixed network infrastructure and hence have dynamic network topology.
  • 3. Mobile Ad-Hoc Network Communication between nodes in Mobile Ad-Hoc Network network via radio communication. Mobile Ad-Hoc Network supports anytime and anywhere. In general routes between nodes in an Mobile ad-hoc network may include multiple hops and call such network as multi-hop Mobile ad-hoc network. It reduced Administrative cost.
  • 4. Application of MANET Mobile Ad-Hoc Network can increase mobility and flexibility, as Mobile ad-hoc networks can be brought up and torn down in a very short time. Mobile Ad-Hoc Network can be more economical in some case, as they eliminate fixed infrastructure costs and reduces power consumption at mobile nodes. Mobile Ad-Hoc network can be more robust then conventional wireless network because of their non-hierarchical distributed control and management mechanisms.
  • 5. Vulnerability of MANET Dynamic Topology Wireless Links Cooperativeness Lack of clear line of defence Limited resources
  • 6. Threat Model Identify the Security Objectives Identify the application overview Decompose Application Identify Threat Identify Vulnerability
  • 7. Attacks on Mobile Ad-Hoc Network Attacks on Mobile ad-hoc network can be classified as active attacks or passive attacks. depending on normal operation of network disrupted or not. Passive Attack Passive attacks is difficult to detect because of this attacks normal operation of network is not affected. This attack target confidentiality attribute of the system. Attacker snoops the data exchanged in network without altering it.
  • 8. Attacks on Mobile Ad-Hoc Network Active Attack In active attacks the intruders can modify the packet,inject the packets, drops the packets. It may disrupts the normal operation of the network. It confuses routing procedure and degrades network performance.
  • 9. Attacks on Ad-Hoc Network Active Attack is classified as External Attack and Internal Attack. External Attack Carried out by nodes that do not belong to the domain of the network. Such attacks can be defended by using source an Authentication, firewalls and encryption. Internal Attack Internal Attacks are from Compromised nodes which are actually part of network.
  • 10. Attacks at Routing layer Black Hole Attack Worm Hole Attack Resource Consumption Attack Rushing Attack Routing Table Poisoning Sybil attack
  • 11. Attacks at Routing layer Replay Attack Sink Hole Attack Link With Holding & Link Spoofing Attacks
  • 13. Thank You ::GUIDED BY:: PROF. PARITA OZA