2011 Second International Conference on Intelligent Systems, Modelling and Simulation 2011
DOI: 10.1109/isms.2011.85
|View full text |Cite
|
Sign up to set email alerts
|

Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…[2] the simulation and modeling of the different attacks on MANET using network simulator is explained in KarimKonate et.al. [3] the paper also discussed the protocols and their immunities to different attacks with analytical modeling and mathematical formulation. A graph based approach is proposed by Zhou Mingqiang et al [11] they proposed graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB).…”
Section: Releted Workmentioning
confidence: 99%
“…[2] the simulation and modeling of the different attacks on MANET using network simulator is explained in KarimKonate et.al. [3] the paper also discussed the protocols and their immunities to different attacks with analytical modeling and mathematical formulation. A graph based approach is proposed by Zhou Mingqiang et al [11] they proposed graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB).…”
Section: Releted Workmentioning
confidence: 99%
“…As because of it only security is big issue for MANET Ms.Chouhan and Ms Yadav [3] proposed a distributive approach to identify and prevent flooding attack. Even some papers on MANET attacks are also given as Mr.Kannhavong [4] did survey on routing attack, Mr.Konte [5] analysis all attacks on MANET. Attacks are to be control and for it various techniques are performed as like cryptographic but it is hard and approaches used are not fully able to solve problem like Mr Zhang [6] approach.…”
Section: IImentioning
confidence: 99%
“…Wormhole attack: Which consists in putting a tunnel between two malicious nodes [29], causing disruptions in normal traffic load and flow [12]. To fend off the Wormhole attacks some authors proposed to use the concept of Hopcount Analysis.…”
Section: Routing Attacksmentioning
confidence: 99%
“…In this mechanism, a route which has a low or high hop counted is considered to be non usable. A so low hop counted can imply an attack of wormhole; while a high hop can also slow down the transmission [29].…”
Section: Routing Attacksmentioning
confidence: 99%
See 1 more Smart Citation