Intelligent internal stealthy attack and its countermeasure for multicast routing protocol in MANET

MP Arthur, K Kannan - ETRI Journal, 2015 - Wiley Online Library
attacking plans intelligently so as to intervene in successful defending schemes. In our work,
we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol

Intelligent stealthy attack on MAODV in mobile ad hoc networks

AM Pushpa, K Kathiravan - 2014 Sixth International …, 2014 - ieeexplore.ieee.org
… a novel intelligent internal attack on a tree-based multicast routing protocol in MANET. …
We introduce intelligent internal attackers in MAODV routing protocol. Any suspicious node can …

[PDF][PDF] A review on attacks and secure routing protocols in MANET

HN Saha, D Bhattacharyya, B Banerjee… - … Journal of Innovative …, 2013 - researchgate.net
… But other attacks such as DoS(Denko) cannot be made stealth. Some … Its target is to
multicast routing protocols that use a duplicate suppression mechanism in order to reduce …

Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks

MP Arthur, K Kannan - Wireless Networks, 2016 - Springer
internal stealthy attack and known direct internal stealthyInternal attack intelligently spans
its attacking plan into intended … system for multicast routing protocol of MANET in order to …

An SVM-based multiclass IDS for multicast routing attacks in mobile ad hoc networks

MP Arthur - 2018 International Conference on Advances in …, 2018 - ieeexplore.ieee.org
… the highly intelligent indirect internal stealthy attacking strategy. … Hence, a common security
attack countermeasure is not … internal attacks of the multicast routing protocol of the MANET. …

Stealthy attack detection in multi-channel multi-radio wireless networks

R Varatharajan, AP Preethi, G Manogaran… - Multimedia tools and …, 2018 - Springer
… of its participants and routing structure, multicast communication … role in smart applications
such as smart home, smart healthcare … vulnerabilities in a wide range of routing protocols [49]. …

[图书][B] Malicious Attacks Detection in Wireless ad hoc Networks

A Ranjan - 2017 - search.proquest.com
… issue of stealthy assault, we can exhibit a protocol referred to … The attacks in routing are
generated thus to harm the MANET. … node to get a licensed route from the intelligent node (a hub …

[PDF][PDF] Using Biological Techniques for MANet security based on fuzzy classification

IM Hanafy - 2013 - researchgate.net
… in areas such as intelligent transportation systems and fault-tolerant … to find proper
countermeasures but existing defense … worked to standardized routing protocols for MANET and …

[PDF][PDF] POWER AWARE AND SECURED ROUTING PROTOCOL IN MOBILE-HOC NETWORK: AD A SURVEY

OM Olaniyan, BA Omodunbi, E Adebimpe… - Technology, 2020 - academia.edu
… optimization for a multicast routing algorithm in MANET. This … ) for selecting optimal routes
to group nodes for multicasting. In … This technique detects stealthy attack and it is isolated from …

A comparative survey of security solutions for multicast and unicast routing protocols in mobile ad hoc networks

AM Pushpa, K Kathiravan - International Journal of Wireless …, 2016 - inderscienceonline.com
… MAODV routing protocol by launching its attacking strategy from the MAC layer. The stealthy
… -art multicast routing attacks and countermeasures in MANETs. We have classified security …