IJCSN - International Journal of Computer Science and Network, Volume 3, Issue 6, December 2014 ISSN (Online): 2277-5420 www.IJCSN.org Impact Factor: 0.274 514 The Comparative Study of Security Mechanism in Mobile Ad-hoc Networks 1 Balamurugan G, 2 Somasundaram R, 3 Sumithra K 1,2,3 M.TECH, Department of Computer Science & Engineering, Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India Abstract - Security mechanism in wireless ad-hoc networks is a highly a challenging concern. Security in the MANET communication network is significant for secure transmission of information. Many security mechanisms for mobile ad-hoc network (MANET) have been proposed in the day to day events. Absence of any central co-ordination mechanism and shared wireless medium makes MANET more susceptible to cyber attacks than wired network there are a number of attacks that affect MANET. In MANET, all networking functions such as routing and packet distribution are performed by nodes in a self organizing manner. Due to these reasons, securing a Mobile Ad- hoc Network is very challenging. We consider the most common types of attacks, namely rushing attack, black hole attack, neighbor attack and jellyfish attack. Exclusively, we study how the number of attackers affects the performance metrics of a multicast session such as throughput, end-to-end delay, packet delivery ratio and delay jitter. Keywords - MANET, Security mechanism, rushing attack, black hole attack, neighbor attack and jellyfish attack. 1. Introduction A Mobile Ad-hoc Network is a set of independent mobile nodes which will communicate with one another node via Radio waves. The mobile nodes that are in radio vary of every different will directly communicate, whereas others nodes are got to aid of intermediate nodes to route their packets. Every of the node contains a wireless interface to speak with one another. These networks are distributed totally, and may work anyplace while not the assistance of any mounted infrastructure as access points or base stations. In MANET, all networking functions like routing and packet forwarding, are performed by nodes themselves during a self-organizing manner. For these reasons, securing a mobile ad -hoc network is incredibly difficult. The goals to evaluate if mobile ad-hoc network is secure or not are as follows: 1.1 Availability Availability relates both data and to services. It ensures the stability of network service despite denial of service attack. 1.2 Confidentiality Confidentiality provides that computer-related resources are accessed solely by approved parties. It wants to be protected against any revealing attack like eavesdropping- unauthorized reading of message. 1.3 Integrity Integrity means resources will be changed solely by approved parties solely in approved manner. Integrity assures that a message being transferred isn't corrupted. 1.4 Authentication Authentication is actually guarantees that the nodes in communication are genuine and not impersonators. The recourses of network ought to be accessed by the genuine nodes. 1.5 Authorization Authorization property assigns completely different access rights to differing kinds of users. as an example a network management will be performed by network administrator solely. 1.6 Resilience to Attacks In this property assigns completely different access rights to differing kinds of users. As an example a network