2022
DOI: 10.22452/mjcs.vol35no4.2
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Manet Security Aspects: Analysis of Attacks and Node Misbehaviour Issues

Abstract: Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited batte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 63 publications
0
5
0
Order By: Relevance
“…Detecting collaborative attacks is difficult. Researchers are exploring security mechanisms [13][14] like intrusion detection systems, reputation-based models, and secure routing protocols to address this. Cooperation among network nodes in sharing information can also help detect and mitigate these threats.…”
Section: Problem Statementmentioning
confidence: 99%
“…Detecting collaborative attacks is difficult. Researchers are exploring security mechanisms [13][14] like intrusion detection systems, reputation-based models, and secure routing protocols to address this. Cooperation among network nodes in sharing information can also help detect and mitigate these threats.…”
Section: Problem Statementmentioning
confidence: 99%
“…This class entails the presentation of various articles pertaining to the identification of malicious nodes in diverse scenarios. MANETs comprise four distinct node types, namely the malicious node, selfish node, erroneous node, and regular node, as documented in [6] and [15]. However, the authors categorized them using varying methods.…”
Section: A Malicious Nodes Mitigationmentioning
confidence: 99%
“…Among the complex security issues in MANETs, profiling the behaviour of nodes [15], and differentiating between "good" and "bad" nodes, stands out due to the heterogeneity of devices integrating a MANET (e.g. laptops, tablet PCs, smartphones).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The routing process in MANET is responsible for discovering, establishing, and maintaining a route between two mobile nodes. Routing of packets can be performed using either a single-hop or a multi-hop paradigm [1]. In the singlehop paradigm, the destination node is assumed to be inside the communication range of the source node.…”
Section: Introductionmentioning
confidence: 99%