2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) 2019
DOI: 10.1109/jeeit.2019.8717449
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(31 citation statements)
references
References 17 publications
0
28
0
Order By: Relevance
“…Recently, many research efforts have been conducted considering Ad-Hoc networks security. Some of them, such as [11]- [14], have discussed and elaborated a comprehensive analysis of Ad-Hoc networks security issues due to its special characteristics along with presenting the proposed defeating approaches against existing attacks.…”
Section: Recent Work In Ad-hoc Network Securitymentioning
confidence: 99%
“…Recently, many research efforts have been conducted considering Ad-Hoc networks security. Some of them, such as [11]- [14], have discussed and elaborated a comprehensive analysis of Ad-Hoc networks security issues due to its special characteristics along with presenting the proposed defeating approaches against existing attacks.…”
Section: Recent Work In Ad-hoc Network Securitymentioning
confidence: 99%
“…Farhan Abdel-Fattah, Farhan Abdel-Fattah, Khalid A. Farhan, Feras H. Al-Tarawneh, Feras H. Al-Tarawneh [2] The survey focus on various attaks on MANET structure and depicts the various vulnerable attacks. Arathy, K. and Sminesh, C, [3] pointed out a strategy to detect single and collaborative black hole attack with minimum overhead.…”
Section: Literature Reviewmentioning
confidence: 99%
“…MANET consists of multiple nodes and each node acts as a host or router. Although various studies have been conducted on secure and efficient data transmission, security and efficiency are still an essential challenging future research topic . MANETs are applicable in cases where communication infrastructure does not exist or infrastructure is costly or difficult in practice.…”
Section: Introductionmentioning
confidence: 99%
“…The latter is about sharing information among each other in an interconnected network and transmitting data on identified path . Routing protocols have two broad categories in MANET: proactive or reactive protocols . Table‐driven protocols like to preserve the latest routing information in its routing table so it is essential for proceeding.…”
Section: Introductionmentioning
confidence: 99%