Open Access   Article Go Back

A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET

R. Yogapriya1 , A. Subramani2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 666-671, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.666671

Online published on Nov 30, 2018

Copyright © R. Yogapriya, A. Subramani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Yogapriya, A. Subramani, “A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.666-671, 2018.

MLA Style Citation: R. Yogapriya, A. Subramani "A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET." International Journal of Computer Sciences and Engineering 6.11 (2018): 666-671.

APA Style Citation: R. Yogapriya, A. Subramani, (2018). A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET. International Journal of Computer Sciences and Engineering, 6(11), 666-671.

BibTex Style Citation:
@article{Yogapriya_2018,
author = {R. Yogapriya, A. Subramani},
title = {A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {666-671},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3222},
doi = {https://doi.org/10.26438/ijcse/v6i11.666671}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.666671}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3222
TI - A Survey on Vulnerabilities, Attacks and Issues in MANET, WSN and VANET
T2 - International Journal of Computer Sciences and Engineering
AU - R. Yogapriya, A. Subramani
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 666-671
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
401 284 downloads 258 downloads
  
  
           

Abstract

An attack in computers systems and its networks may attempt to explore, disable, destroy, steal or gain unauthorized access to make illegal use of asset. World Economic Forum has observed that Scalable algorithms and Robustness of cyber-attacks have significant improvement in the technology. Recent technical reports stated that offensive cyber capabilities were developed more rapidly than our ability to deal with hostile incidents. A computer network attack disrupts the integrity or authenticity of data, usually through malicious code that alters program logic that controls data, leading to errors in output. Network security covers a wide variety of both public and private networks that are regularly utilized in jobs like, transactions and communications among businesses, government agencies and individuals. The review paper presents about the types of attacks with issues and challenges in MANET, WSN and VANET.

Key-Words / Index Term

MANET, WSN, VANET, Security, Attacks, Vulnerabilities

References

[1] Mohan V. Pawar, Anuradha “Network Security and Types of Attacks in Network”, Procedia Computer Science 48, 503 – 506, 2015.
[2] NehaKhandelwal, Prabhakar.M. Kuldeep Sharma, “An Overview Of security Problems in MANET”, ISEM International Conference, 2011.
[3] Anupam Joshi and Wenjia Li. “Security Issues in Mobile Ad Hoc Networks- A Survey”, research gate.
[4] Ali Ghaffari, “Vulnerability and Security of Mobile Ad hoc Networks”, Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Lisbon, Portugal, 124-130, 2006.
[5] Monali S. Gaigole “The Study of Network Security with Its PenetratingAttacks and Possible Security Mechanisms”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, PP: 728-735, 2015.
[6] SarveshTanwar, Prema K.V “Threats & Security Issues in Ad hoc network: A Survey Report”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, 2013.
[7] Satyam Shrivastava, “A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc “,/ International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 218-222, 2013.
[8] DivyaChadha, “Vehicular Ad hoc Network (VANETs): A Review”
[9] Tyagi P, DemblaD,”Investigating the security threats in Vehicular ad hoc Networks (VANETs)”, proc. IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014.
[10] Dr.H.G.Chandrakanth, Rajkumar, Sunitha.K.R “A Survey on Security Attacks in Wireless Sensor Networks”, International Journal of Engineering Research and Applications, Vol. 2, Issue 4, 1684-1691, 2012.
[11] V.E.Ekong,“A Survey of Security Vulnerabilities in Wireless Sensor Networks”, Nigerian Journal of Technology (NIJOTECH) Vol. 35, No. 2, 392 – 397, 2016.
[12] Sarika SA, PravinAb, Vijayakumar AC, Selvamani KD, “Security Issues In Mobile Ad Hoc Networks”
[13] Yongguang Zhang and Wenke Lee, “Security in Mobile Ad-Hoc Networks”, Book Chapter.
[14] T.Kavitha, D.Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security 5, 031-044, 2010.
[15] PriyankaGoyal, VintiParmar, Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Applications”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, 32-38, 2011.
[16] Ram Shringar Raw, “Security Challenges, Issues and Their solutions For VANET”, International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, 2013.