2016
DOI: 10.1016/j.procs.2016.07.382
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…A Mobile Ad-hoc Network (MANET) is a temporary, ever-changing, wireless network, formed by a group of self-organising mobile devices, without the need for any centralised network management or fixed networking infrastructure [1]. Nodes in a MANET need to be able to cooperate and communicate with each other to implement standard networking functionality, to compensate for the lack of a centralised network management authority [2].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A Mobile Ad-hoc Network (MANET) is a temporary, ever-changing, wireless network, formed by a group of self-organising mobile devices, without the need for any centralised network management or fixed networking infrastructure [1]. Nodes in a MANET need to be able to cooperate and communicate with each other to implement standard networking functionality, to compensate for the lack of a centralised network management authority [2].…”
Section: Introductionmentioning
confidence: 99%
“…In a MANET, nodes within transmission range communicate by forwarding messages directly to each other while nodes that are not within transmission range are dependent on intermediary nodes to facilitate communication using either Proactive, Reactive or Hybrid routing protocols. The purpose of a MANET routing protocol is to establish an optimal path (one with the least hops) from the sender node to the receiver node [2]. MANET routing protocols need to function in different networking contexts, ranging from small ad-hoc groups to larger, more complex mobile multi-hop networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Mobile ad-hoc network, nodes are movable. They can freely move in any direction [1]. Due to these features of MANET, this network can be used in military battlefields, emergency, Commercial Sector, Medical Service and disaster recovery situations.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of such attacks are as follows. Message flooding is one of the major attacks in the network layer, where, an attacker aims to exhaust network or node resources such as battery or bandwidth by sending a multitude of route establishment requests[57],[114]. Destination Oriented Directed Acyclic Graph (DODAG) Information Object Message, namely DIO, is used for advertising information about destination/root that is used to build the topology of RPL.…”
mentioning
confidence: 99%