Skip to main content

Table 1 Comparative study of various security attacks: target and prevention

From: DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network

Security attacks (SA)

Active/passive

Threaten

Target of SA

Prevention

Traffic analysis

Passive

Attacks against confidentiality/privacy

Just to obtain the content of message

Data encipherment schemes

Modification

Active

   

Masquerading

Active

Attacks against integrity

Modification of data exchanged between MANET users

Hash function to assure data integrity; SHA-1 or MD5

Replaying

Active

   

Repudiation

Active

Attacks against integrity & authentication

Modification of data & disturbance of source and destination authentication

Hash functions & digital signature techniques

DoS

Active

Attacks against availability

Unavailability of services

Check identity & password of each users in MANET