2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014) 2014
DOI: 10.1109/iccsce.2014.7072781
|View full text |Cite
|
Sign up to set email alerts
|

MANET security: A survey

Abstract: Mobile Ad hoc Networks are being adopted in more and more applications in our daily life. Mobile computing and mobile ad hoc networks in particular have become a daily need. As mobile ad hoc networks have been target for many attacks, the security of these networks has become an essential part of their existence. This paper provides a review of the current threats and how these threats are mitigated. The paper also discusses common attacks on mobile ad hoc networks and classifies these attacks in various class… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 34 publications
(29 reference statements)
0
15
0
Order By: Relevance
“…Many research efforts, for that reason, have investigated MANET in the following areas [7]: (i) Routing [8], (ii) Energy conservation [9], (iii) Quality of Service [10], (iv) Security [11], and (v) Network Management.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Many research efforts, for that reason, have investigated MANET in the following areas [7]: (i) Routing [8], (ii) Energy conservation [9], (iii) Quality of Service [10], (iv) Security [11], and (v) Network Management.…”
Section: Background and Related Workmentioning
confidence: 99%
“…These unique characteristics increase the likelihood of attacks occurring. An overview of common attacks and threads on MANETs has already been provided .…”
Section: Security Mechanismmentioning
confidence: 99%
“…Due to its unique features, MANET is very useful to real world applications where the entire network structure or topology changes dynamically [4]. As a result, many new ad hoc networking applications conceived which are as follows…”
Section: Manet Applicationsmentioning
confidence: 99%