2017
DOI: 10.21817/ijet/2017/v9i1/170901413
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Contemporary MANET Security: Approaches for Securing the MANET

Abstract: Abstract-The wireless mobile nodes are capable to build spontaneously temporary wireless network in absence of infrastructure like AP, Router etc. and they act as a wireless router. Due to this, wireless mobile nodes are capable for forwarding messages to other nodes. MANET (Mobile Adhoc Network) is a one of the wireless network and forms a temporary connection across the mobile nodes without central infrastructure to exchange the information. Due to the characteristics of MANET, it is vulnerable to active and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 76 publications
0
2
0
Order By: Relevance
“…LDW technique authenticates these hello messages. In the end, original event message was encrypted with CST (Ciphertext Stealing Technique) and qu-Vanstone ECC based public key cryptography [30], [31]. This segment also elaborates in detail about proposed effort.…”
Section: Generation Of Results Graphs For Comparative Studymentioning
confidence: 99%
“…LDW technique authenticates these hello messages. In the end, original event message was encrypted with CST (Ciphertext Stealing Technique) and qu-Vanstone ECC based public key cryptography [30], [31]. This segment also elaborates in detail about proposed effort.…”
Section: Generation Of Results Graphs For Comparative Studymentioning
confidence: 99%
“…The most serious active assault in ad hoc networks is the black hole attack. Blackhole node responds to altogether path request packets imagining to have the finest path and subsequently destroys all received packets [9,10]. Honeypots [11], an intelligent software agent is used in this research to suggest a pervasive monitoring strategy.…”
Section: Introductionmentioning
confidence: 99%