2014
DOI: 10.5121/ijnsa.2014.6302
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Manet Misbehaviour Detection Approaches

Abstract: Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…As future work I propose enhancement in mechanism that decreases the constant overhead caused by the cryptography. In addition to that enhancement is proposed to detect a very active form of attack Wormhole Attack [1] that is also a type of co-operative attack leads to disruption of routing process.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As future work I propose enhancement in mechanism that decreases the constant overhead caused by the cryptography. In addition to that enhancement is proposed to detect a very active form of attack Wormhole Attack [1] that is also a type of co-operative attack leads to disruption of routing process.…”
Section: Discussionmentioning
confidence: 99%
“…Trueness Level [15] Field is a 3-bit field that depicts the Trueness Level of the path that is currently under consideration for formation. This mechanism helps in avoiding any type of packet drop attack once the network gets settled and all the nodes establish their identity as well as detecting and eliminating the malicious nodes that are acting as Grayhole [1]. Grayhole attack is detected through the lowering of Trueness Level to Level 0.…”
Section: B Trueness Level Fieldmentioning
confidence: 99%
“…In addition to that enhancement is proposed to detect a very active form of attack Wormhole Attack [1] that is also a type of co-operative attack leads to disruption of routing process.…”
Section: Discussionmentioning
confidence: 99%
“…The main packet drop attacks include Blackhole [1] attack and grayhole [1] attack. Blackhole attack is an attack in which the malicious node fakes a route to a particular destination from itself and when the source node sends a packet to the destination through it, it maliciously drops all the packets.…”
Section: Introductionmentioning
confidence: 99%
“…PathRater is run by every node in the network [31] [26]. A node maintains ratings for every other node it knows in the network basing on the knowledge of misbehaving nodes and link reliability data in order to choose the most suitable path.…”
Section: Pathratermentioning
confidence: 99%