2015
DOI: 10.11591/ijece.v5i5.pp1102-1110
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET

Abstract: <div><table cellspacing="0" cellpadding="0" align="left"><tbody><tr><td align="left" valign="top"><p>Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…To prevent this, DPM requires each contributing node to have an "ID" and a valid "TTP certificate". We investigate possible attacks [23] on route discovery and routing and countermeasures taken by DPM to protect routing in mobile ad-hoc networks [27], [28].…”
Section: Privacy Analysismentioning
confidence: 99%
“…To prevent this, DPM requires each contributing node to have an "ID" and a valid "TTP certificate". We investigate possible attacks [23] on route discovery and routing and countermeasures taken by DPM to protect routing in mobile ad-hoc networks [27], [28].…”
Section: Privacy Analysismentioning
confidence: 99%
“…Each mobile device in the MANET communicates directly with other mobile devices within its radio range, while it can communicate with nodes that are located outside its radio range through intermediate nodes. Moreover, all the nodes must cooperate in forwarding the packets in the network [1]- [3]. MANETs have many distinct characteristics: dynamic network topology, no infrastructure, multi-hop routing, limited resources, and limited bandwidth [4]- [10].…”
Section: Introductionmentioning
confidence: 99%
“…Nodes are assumed to trust each other and to work closely with each other to perform the routing operations. This trust assumption violates the security principles of networks [3], [4], [14]. There are many types of attacks that can threaten MANETs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researches investigate its abilities and methods to enhance its limitations. MANET inadequacies mitigations lie on finding strong cryptosystems, enlarging transmission range and controlling battery drain, the former covered by optimize impenetrable crypto-algorithms, topology engineering and routing protocol optimization [2][3]. On the other hand link failure reduction and route reconfiguration, communication minimization, data compression techniques, and power control mechanisms, are the main fields of battery life enhancement.…”
Section: Introductionmentioning
confidence: 99%