Sixth International Conference on Networking (ICN'07) 2007
DOI: 10.1109/icn.2007.57
|View full text |Cite
|
Sign up to set email alerts
|

Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…In [41], a node determines a sequence of virtual positions to avoid certain area and the routing algorithm forwards packets along a path that is closest to the virtual path. In [19], Khurana et al addressed a similar problem to route around misbehaving nodes in ad hoc networks to minimize the impact of attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [41], a node determines a sequence of virtual positions to avoid certain area and the routing algorithm forwards packets along a path that is closest to the virtual path. In [19], Khurana et al addressed a similar problem to route around misbehaving nodes in ad hoc networks to minimize the impact of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…There have been many studies of non-shortest path routing to achieve various goals such as security [6], [9], [19], [21], [40]- [42], reliability [7], [10], [11], [16], [27], [33], [37] and load balancing [8], [12].…”
Section: Related Workmentioning
confidence: 99%
“…For packet forwarding in the network the nodes will depend on each other because of their limited number in the transmission range. As a result, embedding solutions in routing protocols to handle attacks poses a challenge to the researchers [1]. Basically the routing threats due to attacks in MANETS are mainly because of malicious nodes [2] and selfish nodes [3].…”
Section: Introductionmentioning
confidence: 99%
“…Most of these protocols [4, 5, 6, 7, 8, 9, 10, 11 and1] are based on existing ad hoc routing protocols like AODV [12], DSDV [13] and DSR [14], redesigned to handle attacks. The second approach [15,16,17] separates the detection of malicious nodes from routing [1].…”
Section: Introductionmentioning
confidence: 99%
“…The authors also do not discuss how to use their system in the current Internet. Khuruna et al [16] use a similar technique in ad hoc networking to find paths that are farthest from the adversarial nodes. This technique suffers similar limitations to Zlatokrilov's, while also incurring a slow convergence time.…”
Section: Alternative Approaches and Re-lated Workmentioning
confidence: 99%