2020
DOI: 10.1007/s11277-020-07376-1
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 62 publications
0
11
0
Order By: Relevance
“…As described in [32][33][34][35][36], several authors suggested securing ad hoc on-demand distance vector, a secure routing protocol based on initial encryption that can withstand certain routing assaults while ensuring the integrity and acknowledgement of identification. Other authors introduced an energy-aware secure routing architecture that preserves a trusted environment, isolates misbehaving nodes, and has a minimal control cost.…”
Section: B Related Workmentioning
confidence: 99%
“…As described in [32][33][34][35][36], several authors suggested securing ad hoc on-demand distance vector, a secure routing protocol based on initial encryption that can withstand certain routing assaults while ensuring the integrity and acknowledgement of identification. Other authors introduced an energy-aware secure routing architecture that preserves a trusted environment, isolates misbehaving nodes, and has a minimal control cost.…”
Section: B Related Workmentioning
confidence: 99%
“…2020 [5] A Survey on Power-Aware Optimization Solutions and design challenges for MANETs 2020 [6] A survey of the main types of attack at the network layer, protection mechanisms, detection algorithms in MANET 2013 [7] A survey of various techniques to solve the problem of energy efficiency and load balancing in MANET. 2020 [8] Comparative survey of security issues of MANET and the various methods, and prevent major attacks in MANET 2019 [9] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks 2020…”
Section: Manet [1]mentioning
confidence: 99%
“…A wormhole attack is detected by at least two malicious nodes using a private channel called a tunnel. At this stage, the Wormhole tunnel will then start to collect the data packets and pass them to some other location [31]. A malicious node receives a control packet on one side of the tunnel.…”
Section: Wormhole Attackmentioning
confidence: 99%