2014 IEEE Eighth International Conference on Software Security and Reliability-Companion 2014
DOI: 10.1109/sere-c.2014.37
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks

Abstract: 5DSLG SURJUHVV LQ WHFKQRORJ\ KDYH DOVR LQFUHDVHG WKH GHPDQG RI QHWZRUNHG V\VWHPV 'XH WR WKH VLJQLILFDQFH RI LQIRUPDWLRQ WKDW WUDYHOV WKURXJK WKHVH V\VWHPV VHFXULW\ LVVXHV LQ ZLUHG DQG ZLUHOHVV QHWZRUNV KDYH EHFRPH D SULPH FRQFHUQ

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Due to the revolution of science and technology, it's more difficult to take decision and its leads to the issue of unclear or not expected results are generated, and it is very hard to analysed [12]. Fuzzy concept has the capability to take decisions in a correct manner through a formal mathematics and logic; it generates the qualitative data or predicted data.…”
Section: Methodsmentioning
confidence: 99%
“…Due to the revolution of science and technology, it's more difficult to take decision and its leads to the issue of unclear or not expected results are generated, and it is very hard to analysed [12]. Fuzzy concept has the capability to take decisions in a correct manner through a formal mathematics and logic; it generates the qualitative data or predicted data.…”
Section: Methodsmentioning
confidence: 99%
“…According to the definition in their research paper, Blackhole attack drops all the packet what it receives except Routing Request (RREQ) packets even though their simulation results show considerable amount of data transaction in the presence of Blackhole attack. Authors in [16] conducted a study on few network layer attacks and routing protocols. Finally, they suggested some solutions for routing protocols to overcome network layer attacks through the literature survey.…”
Section: State-of-the-artmentioning
confidence: 99%
“…• Each attack advertises fake route during routing discovery [16], [20]. [23], [24] [14]- [17], [25] Ability to Can not Can Can communicate [13], [24] [14], [16] [12], [20], [25] with [25], [27] destination node…”
Section: ) Blackhole Attack 2) Grayhole Attack 3) Wormhole Attack 4)mentioning
confidence: 99%
See 1 more Smart Citation
“…Instead, an active attack disrupts the operation of the protocol in order to degrade the network performance, gain unauthorized access, and restrict availability. A brief overview of several well-known routing attacks [5,6,7,8] is presented below. a) Passive Eavesdropping Attack: The purpose of eavesdropping attack is to listen the secret or confidential routing information that should be kept secret during the communication.…”
Section: Routing Attacks In Manetsmentioning
confidence: 99%