2010
DOI: 10.5120/1649-2218
|View full text |Cite
|
Sign up to set email alerts
|

Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

Abstract: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. In a mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, dynamically changing network topology, energy constrained operations and lack of centra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…b) Link Spoofing:Link Spoofing occurs when the true identity of the malicious node is not represented by the node, this can be done by changing the IP address or the MAC address. The link spoofers allows loops which results in losing the links to these nodes, It basically allows loops resulting in portioning of network [13]. The malicious node does not broadcast any needed information which results in losing links.…”
Section: Fig (B): Black Hole Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…b) Link Spoofing:Link Spoofing occurs when the true identity of the malicious node is not represented by the node, this can be done by changing the IP address or the MAC address. The link spoofers allows loops which results in losing the links to these nodes, It basically allows loops resulting in portioning of network [13]. The malicious node does not broadcast any needed information which results in losing links.…”
Section: Fig (B): Black Hole Attackmentioning
confidence: 99%
“…BLACK HOLE  REPEATED NEXT HOP NODE [15]  REAL TIME MONITORING [15]  COMPARISON OF SEQUENCE NUMBER [15]  CALCULATION OF PEAK VALUE [15]  CHECK HONESTY OF NODES [15] [14]  DIRECTIONAL ANTENNAS ON NODES [14]  STATISTICAL ANALYSIS ON DATA [14] SINKHOLE  ENCRYPTION AND DECRYPTION METHOD BYZANTINE  ATTACK DEFENCE SYSTEM USING GAME THEORY [16]  ROBUST SOURCE ROUTING (RSR) [7] SESSION HIJACKING  SECURING USER LOGINS [8]  SECURE PASSWORD USING ENCRYPTION [11]  LIMITING USER'S RIGHTS [13] SYN FLOODING  ENCRYPTION AND DECRYPTION METHOD [1] RUSHING ATTACK  ROUTE DISCOVERY PROTOCOL (RAP) [17] IV. CONCLUSION In recent time, MANETs have emerged as one of the most promising device connectivity technology and gained tremendous attention from researchers.…”
Section: Countermeasures To the Attacks Attacks Solutionsmentioning
confidence: 99%
“…In this way, the battery power of the target node will be exhausted by these meaningless tasks, and thus the target node will be out of service to all the benign service requests [6].…”
Section: Restricted Power Supplymentioning
confidence: 99%
“…Sybil attacker uses a number of nodes identities simultaneously. In this case the destination node may not be able to detect the misbehavior because the attacker may get access to all pieces of fragmented information or may alter all the packets towards the same destination [6]. Trusted certification or resource testing can be used as a solution of Sybil attack [12].…”
Section: Sybil Attackmentioning
confidence: 99%
“…• Radio interface can be prevented by Spread Spectrum Communication techniques and Frequency Hopping techniques to protect the nodes from eavesdropping [9].…”
Section: Eavesdroppingmentioning
confidence: 99%