2012 Second International Conference on Advanced Computing &Amp; Communication Technologies 2012
DOI: 10.1109/acct.2012.48
|View full text |Cite
|
Sign up to set email alerts
|

DoS Attacks in Mobile Ad Hoc Networks: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 154 publications
(59 citation statements)
references
References 22 publications
0
52
0
2
Order By: Relevance
“…Jhaveri et al [7] surveyed various DoS attacks that are security concerns in MANETs and some of the proposed solutions to identify and prevent such attacks. They describe various routing protocols, and DoS attacks such as a wormhole, black hole, gray hole attacks and their operations.…”
Section: Related Workmentioning
confidence: 99%
“…Jhaveri et al [7] surveyed various DoS attacks that are security concerns in MANETs and some of the proposed solutions to identify and prevent such attacks. They describe various routing protocols, and DoS attacks such as a wormhole, black hole, gray hole attacks and their operations.…”
Section: Related Workmentioning
confidence: 99%
“…These attacks do not target the routing protocol, instead forcing the node in the network to act in a manner inconsistent with the routes established, generating an excess of traffic or sinking packets maliciously [16]. X.805 describes five key threats [12]:…”
Section: Security Threatsmentioning
confidence: 99%
“…DoS attacks are popular on the Internet [7] and they are extending to last generation fields such as mobile [21], SDN [22], and IoT [23]. Considering such kind of threats perpetrated against a ZigBee system, several attacks target battery powered sensors in order to reduce the lifetime of the device.…”
Section: Related Workmentioning
confidence: 99%