2017 International Conference on Trends in Electronics and Informatics (ICEI) 2017
DOI: 10.1109/icoei.2017.8300907
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and mitigation techniques on mobile ad hoc network — A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Since, they are distributed type of networks having no centralized control, that is why, they are highly vulnerable to different attacks such as eavesdropping, jamming, MITM, DOS, replay, and resource consumption [9], [10]. We, believe IEEE 802.11 is the most commonly adopted technology in this context, because of its wide provisioning in mobiles, smartphones, tablets, PCs, laptops, wearable and body-worn devices.…”
Section: Wireless Ad Hoc Networkmentioning
confidence: 99%
“…Since, they are distributed type of networks having no centralized control, that is why, they are highly vulnerable to different attacks such as eavesdropping, jamming, MITM, DOS, replay, and resource consumption [9], [10]. We, believe IEEE 802.11 is the most commonly adopted technology in this context, because of its wide provisioning in mobiles, smartphones, tablets, PCs, laptops, wearable and body-worn devices.…”
Section: Wireless Ad Hoc Networkmentioning
confidence: 99%
“…For example, the wireless and mobile nodes in MANETs can still perform effectively in harsh and dynamic environments. This advantage further makes MANETs employed in various fields, including intelligent transportation [1,2], the military field [3], and vehicular ad hoc networks [4]. While enjoying the benefits of MANET, there are still a few security and functional concerns that require our attention.…”
Section: Introductionmentioning
confidence: 99%
“…This section talks about concept of Vehicular Ad-Hoc Networks (VANETs) in order to understand the system that needs to be secured. Vehicular networks are an expansion of a mobile ad hoc network which is a type of network in which the nodes move around and change its locations [7]. Along with this, each node in the network is able to communicate wirelessly with other nodes in the network to transmit information.…”
Section: Vehicular Ad-hoc Networkmentioning
confidence: 99%