Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/ias.2007.35
|View full text |Cite
|
Sign up to set email alerts
|

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

Abstract: The unique characteristics of a mobile ad hoc network (MANET)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…This attack can harm the network very badly. Similar to this attack Bo et al (2007) had found an attack called Rushing attack which can also modify the intended destination by making the Request packet to reach the target faster than the request packet from non malicious nodes making the target to think that the malicious route is the intended route. But, in our scenario the malicious node changes the intended destination by sending a wrongly assigned beacon packet to the target node.…”
Section: Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…This attack can harm the network very badly. Similar to this attack Bo et al (2007) had found an attack called Rushing attack which can also modify the intended destination by making the Request packet to reach the target faster than the request packet from non malicious nodes making the target to think that the malicious route is the intended route. But, in our scenario the malicious node changes the intended destination by sending a wrongly assigned beacon packet to the target node.…”
Section: Related Workmentioning
confidence: 98%
“…This algorithm fails if there are other attacks such as sleep deprivation or battery exhaustion which leads to DOS attack in the network. Bo et al (2007) devised a good defence against the rushing attack. This new attack which results in denialof-service attack is introduced in this study.…”
Section: Gerhardsmentioning
confidence: 99%
See 1 more Smart Citation
“…MANETs can generally be set up anywhere and anytime due to their dynamic nature. However, as a result of their unique characteristics, MANETs are more vulnerable to various security threats [3] such as grey-hole attacks, black-hole attacks, eavesdropping, denial of service attacks (DoS), etc. when compared to traditional networks.…”
Section: Introductionmentioning
confidence: 99%
“…Forwarding or routing of data packets by a node requires the consumption of its limited energy without expecting any rewards for its actions. A situation where a significant number of nodes in a MANET selfishly decides to preserve their energy level by minimizing their network participation such as not actively responding to route requests or not forwarding data packets [2], could lead to a degraded network performance [3], and one of the main goals of designing and creating a MANET, i.e., to support vigorous and effective routing operations by ordinary nodes is defeated. Thus, there is a dire need for an efficient reputation and trust management system (RTMS) which encourages the active collaboration of nodes in the network.…”
Section: Introductionmentioning
confidence: 99%