A Survey Study on Attacks in MANET Ad-Hoc Network
Abstract
Full Text:
PDFReferences
Tseng, Fan-Hsun, Li-Der Chou, and Han-Chieh Chao. "A survey of black hole attacks in wireless mobile ad hoc networks." Human-centric Computing and Information Sciences 1.1 (2011): 4.
Cavin, David, Yoav Sasson, and André Schiper. "On the accuracy of MANET simulators." Proceedings of the second ACM international workshop on Principles of mobile computing. ACM, 2002.
BR, Arun Kumar, Lokanatha C. Reddy, and Prakash S. Hiremath. "Performance comparison of wireless mobile ad-hoc network routing protocols." IJCSNS 8.6 (2008): 337.
Goyal, Priyanka, Vinti Parmar, and Rahul Rishi. "Manet: vulnerabilities, challenges, attacks, application." IJCEM International Journal of Computational Engineering & Management 11.2011 (2011): 32-37.
Whitbeck, John, and Vania Conan. "HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks." Computer communications33.13 (2010): 1483-1492.
Samuel, Hany, Weihua Zhuang, and Bruno Preiss. "DTN based dominating set routing for MANET in heterogeneous wireless networking." Mobile Networks and Applications 14.2 (2009): 154-164.
Hinds, Alex, et al. "A review of routing protocols for mobile ad-hoc networks (manet)." International journal of information and education technology 3.1 (2013): 1.
Jhaveri, Rutvij H., et al. "MANET routing protocols and wormhole attack against AODV." International Journal of Computer Science and Network Security 10.4 (2010): 12-18.
Kumar, Pawan. "Analysis of different security attacks in MANETs on protocol stack A-review." In International Journal of Engineering and Technology (IJEAT), ISSN: 2249-8958, Volume-1, Issue-5, 2012. 2012.
Mittal, Shaily, and Prabhjot Kaur. "Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANET's." Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT'09. International Conference on. IEEE, 2009.
Yang, Shengxiang, Hui Cheng, and Fang Wang. "Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40.1 (2010): 52-63.
Oh, Soon Y., Davide Lau, and Mario Gerla. "Content centric networking in tactical and emergency manets." Wireless Days (WD), 2010 IFIP. IEEE, 2010.
Mamatha, G. S., and S. C. Sharma. "A highly secured approach against attacks in MANETS." International Journal of Computer Theory and Engineering 2.5 (2010): 815.
Maulik, Reshmi, and Nabendu Chaki. "A comprehensive review on wormhole attacks in MANET." Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on. IEEE, 2010.
Kassim, Murizah, Ruhani Ab Rahman, and Roihan Mustapha. "Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network." System Engineering and Technology (ICSET), 2011 IEEE International Conference on. IEEE, 2011.
Lego, Kapang, and Dipankar Sutradhar. "Comparative Study of Adhoc Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork 1." (2011).
Rajabhushanam, Cherukuri, and Ayyaswamy Kathirvel. "Survey of wireless MANET application in battlefield operations." International Journal of Advanced Computer Science and Applications 2.1 (2011): 50-58.
Mohseni, Shima, et al. "Comparative review study of reactive and proactive routing protocols in MANETs." Digital ecosystems and technologies (DEST), 2010 4th IEEE international conference on. IEEE, 2010.
https://www.google.co.in/search?q=wormhole+attack+diagram
DOI: https://doi.org/10.23956/ijarcsse/V7I7/0228
Refbacks
- There are currently no refbacks.