2021
DOI: 10.1007/s40031-021-00627-0
|View full text |Cite
|
Sign up to set email alerts
|

TCP/IP Layerwise Taxonomy of Attacks and Defence Mechanisms in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 44 publications
0
1
0
Order By: Relevance
“…VANET's authentication is so much better now [29]. Over the past few years, researchers have devoted more time and energy to improving routing and security to boost network performance as a whole [30]. In this paper, the author explains their idea for a secure routing protocol that uses shared authentication certi cates for groups.…”
Section: Vanet Securitymentioning
confidence: 99%
“…VANET's authentication is so much better now [29]. Over the past few years, researchers have devoted more time and energy to improving routing and security to boost network performance as a whole [30]. In this paper, the author explains their idea for a secure routing protocol that uses shared authentication certi cates for groups.…”
Section: Vanet Securitymentioning
confidence: 99%
“…The launched attacks consist of the Wormhole attack [75], Blackhole [? ], [76], the Sybil attack [? ], the Sinkhole attack [77], the Routing Table Poisoning attack [78], DoS attack [79], [80], the DDoS attack [80], [81], with the target being the WSN Nodes of Prime MotorX.…”
Section: B Hacking Scenario On Network Layermentioning
confidence: 99%
“…2. Shared key authentication; this is the same as open system authentication but it includes a challenge (requires WEP keys to be matched) and response between AP and the user [67,68]. In this method, the key is delivered to wireless clients with the help of a secured and protected channel which is independent of any standard and protocols being used.…”
Section: Fake Authentication-based Attacksmentioning
confidence: 99%
“…One of the key benefits is that the final data or result will not be shown in different format, but it will appear to be in regular hexadecimal format [67].…”
mentioning
confidence: 99%