2020
DOI: 10.1504/ijcnds.2020.10025198
|View full text |Cite
|
Sign up to set email alerts
|

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

Abstract: Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in modern technology for transmitting the packets from source node to destination node. The absence of any central contrivance makes MANETs more prone to cyber-attacks. So it is expected to meet the different security requirements such as authentication, confidentiality, integrity, anonymity, and availability . So this paper, developed a detailed survey about the techniques used for solving the various issues like security, au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 67 publications
(88 reference statements)
0
5
0
Order By: Relevance
“…Evaluate several assessment measures of node density levels. [9,19,27] Nada Mouchfiq, in 2019 explains network security using the Blockchain to enable the adoption of new processes, enable the exchange of messages and information, and enable autonomous device coordination. they put up a security approach called "MPR Blockchain" it is based on the Blockchain and is more suited to our needs as a group working in ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…Evaluate several assessment measures of node density levels. [9,19,27] Nada Mouchfiq, in 2019 explains network security using the Blockchain to enable the adoption of new processes, enable the exchange of messages and information, and enable autonomous device coordination. they put up a security approach called "MPR Blockchain" it is based on the Blockchain and is more suited to our needs as a group working in ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…Wormhole attacks, flooding attacks, grey-hole attacks, DoS, selfish node misbehaviour, impersonation attacks, black hole attacks etc. are a few examples of these attacks [2], which occur due to malicious nodes interacting within the network. Detailed strategies for these attacks are listed below: Two main processes make up MANET dependable security: security service and attacks, which refer to some defence systems for a highly protected network.…”
Section: Security Issues and Exploitation In Current Routing Operationsmentioning
confidence: 99%
“…Security has emerged as a significant component to ensure communication between mobile nodes in a malicious environment. The goal of the security measures of MANET is to provide services such as verification, confidentiality, integrity, availability, and accessibility [2].…”
Section: Security Issues and Exploitation In Current Routing Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure routing among these mobile nodes is the better option to protect the communication in MANET. At present, there are various forms and taxonomies of secure routing protocol in MANET [2]- [4]. Each has its advantage as well as its limitations.…”
Section: Introductionmentioning
confidence: 99%