2012
DOI: 10.28945/1628
|View full text |Cite
|
Sign up to set email alerts
|

Routing Security in Mobile Ad-hoc Networks

Abstract: The role of infrastructure-less mobile ad hoc networks (MANETs) in ubiquitous networks is outlined. In a MANET there are no dedicated routers and all network nodes must contribute to routing. Classification of routing protocols for MANET is based on how routing information is acquired and maintained by mobile nodes and/or on roles of network nodes in a routing. According to the first classification base, MANET routing protocols are proactive, reactive, or hybrid combinations of proactive and reactive protocols… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0
3

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 33 publications
(30 reference statements)
0
5
0
3
Order By: Relevance
“…Gateway routers connecting IoT devices in MANETs must be trusted and reliable interfaces for secure MANET routing protocols and secure Internet routing protocols. Although many proposals for secure MANET routing exist, none of these provides protection against all current and possible future security attacks [22]. Looking forward, it is likely a synthesis of current and future proposals for secure MANET routing protocols will be needed to enable protection against existing security attacks, while emerging MANET-connected IoT systems present an entirely different set of challenges which will mandate new and innovative solutions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Gateway routers connecting IoT devices in MANETs must be trusted and reliable interfaces for secure MANET routing protocols and secure Internet routing protocols. Although many proposals for secure MANET routing exist, none of these provides protection against all current and possible future security attacks [22]. Looking forward, it is likely a synthesis of current and future proposals for secure MANET routing protocols will be needed to enable protection against existing security attacks, while emerging MANET-connected IoT systems present an entirely different set of challenges which will mandate new and innovative solutions.…”
Section: Discussionmentioning
confidence: 99%
“…[21] IV. THREATS AND VULNERABILITIES TO ROUTING IN MANETS Security threats against routing in MANETs are classified into either passive or active attacks [22]. The purpose of a passive attack is usually to eavesdrop on routing communication and to retrieve information from monitored data packets.…”
Section: Backbone Routermentioning
confidence: 99%
“…The open nature and absence of dedicated routers mean that MANETs are especially vulnerable to routing attacks [1,2] which can lead to severe disruption of network communications. The wormhole attack [3] is one of the most serious MANET routing threats since it is relatively easy to launch, difficult to detect and can yet cause significant communications disruption.…”
Section: Introductionmentioning
confidence: 99%
“…In today's world, the computing can be done on any device, such as phones, sensors, vehicles, military equipment etc. Due to this, the affinity is towards the self-configuring and infrastructure-less mobile ad hoc networks (MANETs) [12]. MANET is a group of mobile nodes and connected through a provisional and spontaneous network.…”
Section: Introductionmentioning
confidence: 99%