2010
DOI: 10.3844/jcssp.2010.1416.1423
|View full text |Cite
|
Sign up to set email alerts
|

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

Abstract: Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for detecting MAC layers attacks, data for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The drawbacks related to the quality of service (QoS) in MANET are bandwidth limitations, vibrant and non-predictive topology and the limited processing and minimum storage of mobile nodes (Murugan and Shanmugam, 2010). MANETs introduce various security risks due to their open communication medium, node mobility, lack of centralised security services, and lack of prior security association.…”
Section: Manetmentioning
confidence: 99%
“…The drawbacks related to the quality of service (QoS) in MANET are bandwidth limitations, vibrant and non-predictive topology and the limited processing and minimum storage of mobile nodes (Murugan and Shanmugam, 2010). MANETs introduce various security risks due to their open communication medium, node mobility, lack of centralised security services, and lack of prior security association.…”
Section: Manetmentioning
confidence: 99%
“…In our previous work [8], we have developed a combined solution for routing and MAC layer attacks. Our approach, make use of three techniques simultaneously which consists of a cumulative frequency based detection technique for detecting MAC layers attacks, data forwarding behavior based detection technique for detecting packet drops and MAC based authentication technique for packet modification.…”
Section: A Node Capture Attacksmentioning
confidence: 99%
“…These networks have also been used in private areas and home networking, "location-based" services, sensor networks and many more services based on MANET [1,2].…”
Section: Manetmentioning
confidence: 99%