International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-7  ( Jul, 2020 )
Past issues
  1. Volume-8,Issue-6  ( Jun, 2020 )
  2. Volume-8,Issue-5  ( May, 2020 )
  3. Volume-8,Issue-4  ( Apr, 2020 )
  4. Volume-8,Issue-3  ( Mar, 2020 )
  5. Volume-8,Issue-2  ( Feb, 2020 )
  6. Volume-8,Issue-1  ( Jan, 2020 )
  7. Volume-7,Issue-12  ( Dec, 2019 )
  8. Volume-7,Issue-11  ( Nov, 2019 )
  9. Volume-7, Issue-10  ( Oct, 2019 )
  10. Volume-7, Issue-9  ( Sep, 2019 )

Statistics report
Sep. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 90
Paper Published : 1248
No. of Authors : 3136
  Journal Paper

Paper Title
Secure Communication Against Malicious Deeds In Multicast Routing In Manet (Survey)

Mobile ad hoc network (MANET) has emerged as a new edge of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more susceptible to malicious attack. Due to the absence of centralized administration, security is the main issue in mobile Ad hoc network and attackers are very easily modified the actual behavior and performance of network. Security issues of MANETs in group (multicast) communications are even more challenging because of the involvement of multiple senders and multiple receivers. Although several types of security attacks in MANETs have been studied in the literature, the focus of earlier research was only on unicast (point-to-point) applications. The impacts of security attacks on multicast in MANETs have not yet been explored.. The main aim is to observe the performance of network and applied method to secure network against malicious deeds. In real life, such an altruistic attitude is more than often extremely difficult to realize and so we often find malicious nodes also present in the same network. Some of these are unknown nodes, which enter the network during its establishment or operation phase, while others may originate indigenously by compromising an existing node. Keywords- Mobile Ad -Hoc Networks, Multicasting, Security, Wormhole Attack.

Author - Devendra Singh Kushwaha, Vikash K Singh, Shaibya Singh, Sonal Sharma

| PDF |
Viewed - 68
| Published on 2015-03-03
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World