2013
DOI: 10.5815/ijcnis.2013.10.01
|View full text |Cite
|
Sign up to set email alerts
|

Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

Abstract: Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralised infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired networks. Hence, providing security to this infrastructure-less network is a major issue. This paper investigates on the security mechanisms that are proposed for Selfish node attack, Share… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…In this section, the shortcomings identified from the state-of-art approaches proposed in the literature (Table 1) over the recent years [30][31] are presented.…”
Section: Extract Of the Literaturementioning
confidence: 99%
“…In this section, the shortcomings identified from the state-of-art approaches proposed in the literature (Table 1) over the recent years [30][31] are presented.…”
Section: Extract Of the Literaturementioning
confidence: 99%
“…The simulation experiments of the proposed HHOA-NLOS-LS are conducted using EstiNet 8.1 network simulator in order to investigate its predominance over the benchmarked schemes used for comparison. [27][28][29][30][31][32][33] The network simulator EstiNet 8.1 is used for simulating the proposed HHOA-NLOS-LS, since it is the world-renowned tool that is a commercial version of the NCTUns network simulator and acts as an emulator. EstiNet simulator facilitates vital capabilities that include realistic distance based vehicle movement and optimally enhanced IEEE 802.11p/1609 VANET network simulation of the road for VANET.…”
Section: Computational Complexitymentioning
confidence: 99%
“…One of the yet unanswered issues in the area of MANET is to accomplish an efficient scalability of the network. An example of the work [25] [26] [27] [28] shows that the open issue is associated with the highest dimensionality of the mobile nodes that should be considered in mobile adhoc network at the time of evaluating security issues. Reviewing Section I, it can be seen that mobile adhoc network has lack of infrastructure with less computational capability and resource constraint.…”
Section: B Scalabilitymentioning
confidence: 99%
“…The incorporated properties of the MANET system are the sole reason for quality of services too. Although various work like [28] [29], [30], etc has addresses the routing security, but it failed to address specifically more critical issues like channel capacity (packet delivery ratio, bandwidth, jitter, delay etc). It can be easily seen from all these above mentioned work that although the optimal security is established, but it has no positive effect on QoS parameters.…”
Section: Quality Of Service (Qos)mentioning
confidence: 99%