2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.199
|View full text |Cite
|
Sign up to set email alerts
|

Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs

Abstract: From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key reasons for this is the ambiguous nature of insider attacks in these networks. In recent years, many attempts have been made to study the intrinsic attributes of these insider attacks but the focus has generally been on the analysis of one or very few particular attacks, or only the survey of various attacks without any performance analysis. Therefore, a major feature that research h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
18
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(19 citation statements)
references
References 13 publications
0
18
0
1
Order By: Relevance
“…There are many techniques presented by many scholars to detect and control the sinkhole attacks in MANET [7]. [6], Kashif Saghar explain the working of RAEED protocol to resolve the sinkhole attacks during data transmission.…”
Section: Related Workmentioning
confidence: 99%
“…There are many techniques presented by many scholars to detect and control the sinkhole attacks in MANET [7]. [6], Kashif Saghar explain the working of RAEED protocol to resolve the sinkhole attacks during data transmission.…”
Section: Related Workmentioning
confidence: 99%
“…From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key reasons for this is the ambiguous nature of insider attacks in these networks [6]. The security threats have been extensively discussed and investigated in the wired and wireless networks [7].…”
Section: Introductionmentioning
confidence: 99%
“…The aim ofblackhole nodes (Manikandan and Manimegalai, 2013) is to maximize overall end to end delay and routing overhead for all the traversed nodes in active route and results in low throughput and packet delivery ratio. In recent years, various studies have been made (Usha and Bose, 2012;Jalil et al, 2011;Garg et al, 2012;Ameza et al, 2010;Ramachandran and Shanmugam, 2012;Ehsan and Khan, 2012) to analyze the impact of node misbehavior attacks, especially blackhole attack, on AODV routing protocol in MANET and WSN.…”
Section: Introductionmentioning
confidence: 99%