Routing protocols in ad hoc networks: A survey

A Boukerche, B Turgut, N Aydin, MZ Ahmad, L Bölöni… - Computer …, 2011 - Elsevier
Ad hoc wireless networks perform the difficult task of multi-hop communication in an
environment without a dedicated infrastructure, with mobile nodes and changing network …

A survey of mobile ad hoc network attacks

PM Jawandhiya, DM Ghonge, MS Ali… - Pradip M. Jawandhiya …, 2010 - papers.ssrn.com
Security is an essential requirement in mobile ad hoc network (MANETs). Compared to
wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted …

[PDF][PDF] A comprehensive survey on intrusion detection in MANET

S Sahu, SK Shandilya - International Journal of Information …, 2010 - academia.edu
With the progression of computer networks extending boundaries, Mobile ad hoc network
(MANET) has emerged as a new frontier of technology to provide any where, any time …

[PDF][PDF] A trust based security scheme for RREQ flooding attack in MANET

SK Shandilya, S Sahu - International journal of computer applications, 2010 - academia.edu
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and
its ability to provide instant wireless networking capabilities where implementation of wired …

[PDF][PDF] A study of wireless ad-hoc network attack and routing protocol attack

M Kumar, A Bhushan, A Kumar - International Journal of Advanced …, 2012 - academia.edu
Security is an essential requirement in wireless ad hoc network. Compared to wired
networks, wireless ad hoc network are more vulnerable to security attacks due to the lack of …

RFAP, a preventive measure against route request Flooding Attack in MANETS

K Laeeq - 2012 15th International Multitopic Conference (INMIC …, 2012 - ieeexplore.ieee.org
The operations of Mobile Ad-hoc Networks (MANETs) are still insecure due to some
reasons. One of the main reasons is insecure routing protocol. Generally ad-hoc network …

[PDF][PDF] A Efficient Way To Minimize the Impact of Gray Hole Attack in Adhoc Network

CS Dhamande, HR Deshmukh - International Journal of Emerging …, 2012 - Citeseer
This paper analyzes the gray hole attack which is one of the possible attacks in ad hoc
networks. In this we are mainly focus on the impact of gray hole attack on adhoc network & …

[PDF][PDF] Survey on mobile Ad Hoc network attacks and mitigation using routing protocols

SP Manikandan, R Manimegalai - American Journal of Applied …, 2012 - researchgate.net
ABSTRACT Mobile Ad hoc Networks (MANET) due to its unpredictable topology and
bandwidth limitations are vulnerable to attacks. Establishing security measures and finding …

[PDF][PDF] Indicators for detecting Sinkhole Attack in MANET

SR Jathe, DM Dakhane - … Journal of Emerging Technology and Advanced …, 2012 - Citeseer
Due to fundamental characteristics, routing protocols in wireless mobile ad hoc networks
(MANETs) are particularly vulnerable to attack as the medium is easily monitored, the …

[PDF][PDF] NAODV-Distributed Packet Dropping Attack Detection in MANETs

BS Kakoty, SM Hazarika, N Sarma - International Journal of …, 2013 - researchgate.net
Mobile ad hoc network (MANET) is a self configuring network in which mobile nodes are
connected by wireless link. Communication in MANET is done with the help of cooperation …