2012 IEEE International Conference on Computational Intelligence and Computing Research 2012
DOI: 10.1109/iccic.2012.6510172
|View full text |Cite
|
Sign up to set email alerts
|

Effects of malicious attacks in mobile ad-hoc networks

Abstract: The mobile ad-hoc networks (MANET) are an emerging research area with applications. It has features like working as a router, dynamic topology and autonomous. In MANET, nodes have limited resources like battery power, storage space and bandwidth. There is a need to do more research for Denial of Service (DoS) attacks in MANET as compared to wire line DoS attacks. MANET is vulnerable to different types of DoS attack in which packets are drop. Black hole attack, packet drop attack and gray hole attack are an eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…This area is in the rectangular. [11] A waypoint model is described with three parameters: minimum velocity, maximum velocity and maximum pause time. The speed of mobile nodes is uniformly distributed between the minimum speeds to the maximum speed.…”
Section: Mobility Modelmentioning
confidence: 99%
“…This area is in the rectangular. [11] A waypoint model is described with three parameters: minimum velocity, maximum velocity and maximum pause time. The speed of mobile nodes is uniformly distributed between the minimum speeds to the maximum speed.…”
Section: Mobility Modelmentioning
confidence: 99%
“…One of the denial of service (DOS) attacks in MANET is known as black hole attack [10]. The attack can be launched from the internal or external malicious nodes.…”
Section: Black Hole Attackmentioning
confidence: 99%
“…Various authors have proposed security solutions to protect MANETs from attacks [11,12]. Honeypots are a special type of mechanism for intrusion detection, designed to trap attackers and gather information about them.…”
Section: Related Workmentioning
confidence: 99%