Signals and Communication Technology
DOI: 10.1007/978-0-387-33112-6_5
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
265
0
2

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 412 publications
(267 citation statements)
references
References 35 publications
0
265
0
2
Order By: Relevance
“…BLACK HOLE  REPEATED NEXT HOP NODE [15]  REAL TIME MONITORING [15]  COMPARISON OF SEQUENCE NUMBER [15]  CALCULATION OF PEAK VALUE [15]  CHECK HONESTY OF NODES [15] [14]  DIRECTIONAL ANTENNAS ON NODES [14]  STATISTICAL ANALYSIS ON DATA [14] SINKHOLE  ENCRYPTION AND DECRYPTION METHOD BYZANTINE  ATTACK DEFENCE SYSTEM USING GAME THEORY [16]  ROBUST SOURCE ROUTING (RSR) [7] SESSION HIJACKING  SECURING USER LOGINS [8]  SECURE PASSWORD USING ENCRYPTION [11]  LIMITING USER'S RIGHTS [13] SYN FLOODING  ENCRYPTION AND DECRYPTION METHOD [1] RUSHING ATTACK  ROUTE DISCOVERY PROTOCOL (RAP) [17] IV. CONCLUSION In recent time, MANETs have emerged as one of the most promising device connectivity technology and gained tremendous attention from researchers.…”
Section: Countermeasures To the Attacks Attacks Solutionsmentioning
confidence: 99%
“…BLACK HOLE  REPEATED NEXT HOP NODE [15]  REAL TIME MONITORING [15]  COMPARISON OF SEQUENCE NUMBER [15]  CALCULATION OF PEAK VALUE [15]  CHECK HONESTY OF NODES [15] [14]  DIRECTIONAL ANTENNAS ON NODES [14]  STATISTICAL ANALYSIS ON DATA [14] SINKHOLE  ENCRYPTION AND DECRYPTION METHOD BYZANTINE  ATTACK DEFENCE SYSTEM USING GAME THEORY [16]  ROBUST SOURCE ROUTING (RSR) [7] SESSION HIJACKING  SECURING USER LOGINS [8]  SECURE PASSWORD USING ENCRYPTION [11]  LIMITING USER'S RIGHTS [13] SYN FLOODING  ENCRYPTION AND DECRYPTION METHOD [1] RUSHING ATTACK  ROUTE DISCOVERY PROTOCOL (RAP) [17] IV. CONCLUSION In recent time, MANETs have emerged as one of the most promising device connectivity technology and gained tremendous attention from researchers.…”
Section: Countermeasures To the Attacks Attacks Solutionsmentioning
confidence: 99%
“…Steering is vital with a specific end goal to find the current topology so that a refreshed course to a specific hub can be set up and a message handed-off to the right goal [3,6]. The conventional steering conventions, for example, separate vector and connection state conventions that have been organized for hard wired systems can't be straightforwardly connected to MANETs.…”
Section: Routing In Manetsmentioning
confidence: 99%
“…The antennas may be unidirectional, highly directional, or a combination. The mobile nodes are resource constraint in terms of bandwidth and battery power [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…Comprehensive surveys of cyber threats and defence mechanisms in general-use wireless networks can be found in [78] for WMNs and in [79] for MANETs. Here, we present the information security measures taken by wireless communication networks that have been recently designed specifically for use in emergencies.…”
Section: Wireless Communication Networkmentioning
confidence: 99%