Session Hijacking in Mobile Ad-hoc Networks: Trends, Challenges and Future

Session Hijacking in Mobile Ad-hoc Networks: Trends, Challenges and Future

Kuyoro Shade O., Okolie Samuel O. and Oyebode Aduragbemi
Department of Computer Science, Babcock University, Nigeria

Research Journal of Mathematics and Computer Science

Technological advancement in the field of telecommunication has led to the creation of highly dynamic networks, one of such is Mobile Ad-Hoc Networks which can be described as an autonomous collection of devices (mobile devices) that offers dynamic topologies, no central administration, dynamic and ever mobile nodes and so on, information becomes easy to disseminate. Mobile Ad-Hoc Networks and the various features it provides affects the security of the network. A network with dynamic nodes and no central administration can be prone to network attacks one of such is session hijacking. Integrity is paramount in any network, session hijacking affects the integrity of data on a network, important information is leaked also due to the sensitive application of MANETs especially in the military these has to be avoided. This paper looks into session hijacking in MANETS, reviewed various existing solutions to find out gaps and also proposing an optimised IDS which offers more flexibility and also dynamic applications in any network traffic environment.

Keywords: Session Hijacking; Intrusion Detection System, Information Sharing, Security, Confidentiality

Free Full-text PDF

How to cite this article:
Oyebode Aduragbemi. Session Hijacking in Mobile Ad-Hoc Networks: Trends, Problems and Future. Research Journal of Mathematics and Computer Science, 2017,1:2. DOI:10.28933/rjmcs-2017-10-3001


1 Aarti, & Tyagi, S. S. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks . International Journal of Advanced Research in Computer Science and Software Engineering .
2 Agrawal, V., & Chauhan, H. (2014). An Overview of security issues in Mobile Ad hoc Networks . International Journal of Computer Engineering and Science.
3 Alkharashi, A. (2016). Wireless & Telecommunication. 2nd International Conference and Business Expo . Saudi Arabia: Open Access Jorunal.
4 Amiria, E., Keshavarzb, H., Heidaric, H., Mohamadid, E., & Moradzadehe, H. (2013). Intrusion Detection Systems in MANET: A Review . Elsevier.
5 Augustine, A., & Sebastian, E. (2016). Routing Mechanism for Mobile Ad Hoc Networks with Improved Security Features. Journal of Telecommunications System & Management.
6 Geetha, A., & Sreenath, N. (2016). Review of Security Threats and its Countermeasures in Mobile Adhoc Networks. AENSI Journals .
7 Mangrulkar, N. S., Patil, A. R., & Pande, A. S. (2014). Network Attacks and Their Detection Mechanisms: A Review . International Journal of Computer Applications .
8 Meenatchi, I., & Palanivel, K. (2014). Intrusion Detection System in MANETS: A Survey . International Journal of Recent Development in Engineering and Technology .
9 R.Ragupathy, & Sharma, R. (2014). Detecting Denial of Service Attacks by Analysing Network Traffic in Wireless Networks . International Journal of Grid Distribution Computing
10 Raja, L., & Baboo, S. S. (2014). An Overview of MANET: Applications, Attacks and Challenges. International Journal of Computer Science and Mobile Computing .
11 Scheme, S. o. (2015). Noureldien A. Noureldien; Saeed K. Saeed; M. Ahmed Salih; Alsawi M. Ahmed. British Journal of Mathematics & Computer Science .
12 Singh, M., & Kaur, G. (2013). A Surveys of Attacks in MANET. International Journal of Advanced Research in Computer Science and Software Engineering .
13 Wage, P., & Patil, C. (2014). INTRUSION-DETECTION SYSTEM FOR MANETS: A SECURE EAACK . International Journal of Research in Engineering and Technology
14 Zanoon, N., Albdour, N., Hamatta, H. S., & Al-Tarawneh, R. (2015). SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS . International Journal of Network Security & Its Applications

Terms of Use/Privacy Policy/ Disclaimer/ Other Policies:
You agree that by using our site, you have read, understood, and agreed to be bound by all of our terms of use/privacy policy/ disclaimer/ other policies (click here for details).

This work and its PDF file(s) are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.