2008
DOI: 10.1016/j.adhoc.2006.07.005
|View full text |Cite
|
Sign up to set email alerts
|

A study of different types of attacks on multicast in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 111 publications
(68 citation statements)
references
References 13 publications
0
68
0
Order By: Relevance
“…Spoofing, jamming, wormhole, hello flood, DOS, sink hole, etc. are the examples of active attacks [72][73][74][75][76].…”
Section: Activementioning
confidence: 99%
See 2 more Smart Citations
“…Spoofing, jamming, wormhole, hello flood, DOS, sink hole, etc. are the examples of active attacks [72][73][74][75][76].…”
Section: Activementioning
confidence: 99%
“…This type of attack is performed by physical tampering of node, revelation of confidential information, causing denial of service to authorized node etc. [71][72][73][74][75].…”
Section: Internal Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The wormhole infected group head mars the inter group and intra group communication. The pruning of group head is more complex because the associated group members have to be reassigned to a genuine group head availing the group service causing multicast tree reconfiguration [15].…”
Section: Figure 5: Wormhole Attack (Out Of Band Channel)mentioning
confidence: 99%
“…A mobile ad hoc network is a collection of mobile nodes communicating with the help of wireless links without any underlying centralized infrastructure or base station [2]. It is an adaptive self-configurable network so the mobile nodes can be deployed quickly.…”
Section: Introductionmentioning
confidence: 99%