From: DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network
Security attacks (SA) | Active/passive | Threaten | Target of SA | Prevention |
---|---|---|---|---|
Traffic analysis | Passive | Attacks against confidentiality/privacy | Just to obtain the content of message | Data encipherment schemes |
Modification | Active | Â | Â | Â |
Masquerading | Active | Attacks against integrity | Modification of data exchanged between MANET users | Hash function to assure data integrity; SHA-1 or MD5 |
Replaying | Active | Â | Â | Â |
Repudiation | Active | Attacks against integrity & authentication | Modification of data & disturbance of source and destination authentication | Hash functions & digital signature techniques |
DoS | Active | Attacks against availability | Unavailability of services | Check identity & password of each users in MANET |