Skip to main content

Table 1 Comparative study of various security attacks: target and prevention

From: DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network

Security attacks (SA) Active/passive Threaten Target of SA Prevention
Traffic analysis Passive Attacks against confidentiality/privacy Just to obtain the content of message Data encipherment schemes
Modification Active    
Masquerading Active Attacks against integrity Modification of data exchanged between MANET users Hash function to assure data integrity; SHA-1 or MD5
Replaying Active    
Repudiation Active Attacks against integrity & authentication Modification of data & disturbance of source and destination authentication Hash functions & digital signature techniques
DoS Active Attacks against availability Unavailability of services Check identity & password of each users in MANET