2007
DOI: 10.1109/mwc.2007.4396947
|View full text |Cite
|
Sign up to set email alerts
|

A survey of routing attacks in mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
173
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 412 publications
(182 citation statements)
references
References 12 publications
0
173
0
1
Order By: Relevance
“…They highlighted security attacks that MANET routing protocols are vulnerable to and identified mechanisms such as cryptography schemes, key management, and special hardware using GPS as some possible solutions to such attacks. Similarly, Kannhavong et al [6] surveyed routing attacks in MANETs. They investigated various security issues in MANETs and examined routing attacks, such as flooding, black holes, wormholes, replays, link spoofing, and colluding attacks, as well as solutions to such attacks in MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…They highlighted security attacks that MANET routing protocols are vulnerable to and identified mechanisms such as cryptography schemes, key management, and special hardware using GPS as some possible solutions to such attacks. Similarly, Kannhavong et al [6] surveyed routing attacks in MANETs. They investigated various security issues in MANETs and examined routing attacks, such as flooding, black holes, wormholes, replays, link spoofing, and colluding attacks, as well as solutions to such attacks in MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…Romit roy Choudhury, S. Bandyopadhyay and Krishna Paul [9] proposed a distributed Mechanism for Topology discovery in Ad Hoc Wireless Networks Using Mobile Agents where they have defined a concept of information aging on link affinity based on which a predictive algorithm running on each node can predict the current Network topology based on the current Network information stored at that node. Link affinity, associated with a link between two nodes n and m, is a prediction about span of life of that link in a particular context.…”
Section: Related Papersmentioning
confidence: 99%
“…A first category of research we studied did not specifically cover AMIs but were useful in clarifying the threats common to wireless networks. For instance, [5] examines attacks on wireless networks to motivate solutions to address the privacy issue, [6] developed a threat model to guide the design of a secure WLAN architecture, [7] and [8] study threats on mobile ad-hoc networks (MANET), [9] focuses on sensor networks, and [10] and [11] investigate threats specific to mesh networks.…”
Section: A Survey Of Previous Literaturementioning
confidence: 99%