Analysis of attacks on routing protocols in MANETs

RK Kapur, SK Khatri - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
attacks. In this paper we have studied the vulnerabilities of the routing protocols and the
attack … can possibly lead to various external and internal attacks. The current literature on the …

Attack analysis and detection for ad hoc routing protocols

Y Huang, W Lee - Recent Advances in Intrusion Detection: 7th …, 2004 - Springer
… In addition, we consider a number of more complex attackattack scenarios are summarized
in Table 3. As a case study, we analyze AODV [PBRD03], a popular MANET routing protocol

Security attacks and secure routing protocols in RPL-based Internet of Things: Survey

A Kamble, VS Malemath, D Patil - … International Conference on …, 2017 - ieeexplore.ieee.org
… be designed to provide secure routing communications for devices enabled … attack and
describe how topology attacks are prevented in RPl and further discuss secure routing protocols

[PDF][PDF] A review on attacks and secure routing protocols in MANET

HN Saha, D Bhattacharyya, B Banerjee… - … Journal of Innovative …, 2013 - researchgate.net
… by the commonly known routing protocols, and classify these attacks. Brief descriptions of
these attacks are given, mainly emphasizing on the network level attacks. Further we briefly …

A survey of routing attacks in mobile ad hoc networks

B Kannhavong, H Nakayama, Y Nemoto… - IEEE Wireless …, 2007 - ieeexplore.ieee.org
… We provide an overview of routing protocols in a MANET. We survey routing attacks against
MANETs. We provide a brief overview of countermeasures against routing attacks. Then, we …

[PDF][PDF] Malicious attacks on ad hoc network routing protocols

PW Yau, S Hu, CJ Mitchell - International …, 2007 - repository.royalholloway.ac.uk
… their attacks. Both data packets and control packets, as used by the routing protocol, are
vulnerable to attacks. … or reactive routing protocols are inherently more secure against attacks by …

[PDF][PDF] MANET Routing Protocols Attacks and Mitigation Techniques: A Review

TA Teli, R Yousuf, DA Khan - International Journal of …, 2022 - kalaharijournals.com
… to the destination node and later on carry away the attacks such as packet dropping. We
illustrate this type of attack on the AODV routing protocol. Fig. 6, below shows this type of attack. …

Rushing attacks and defense in wireless ad hoc network routing protocols

YC Hu, A Perrig, DB Johnson - Proceedings of the 2nd ACM workshop …, 2003 - dl.acm.org
… possible attacks on network routing. In this paper, we present the rushing attack, a new attack
that … on-demand ad hoc network routing protocols. For example, DSR, AODV, and secure …

[PDF][PDF] A survey of attacks on manet routing protocols

S Tayal, V Gupta - International Journal of Innovative Research in …, 2013 - academia.edu
… So a combination of number of techniques should be used to fully secure the AODV Routing
Protocol. In this paper we have described some of the possible attacks on AODV and some …

FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks

NT Luong, TT Vo, D Hoang - Wireless Communications and …, 2019 - Wiley Online Library
… We propose a flooding attack detection algorithm to detect malicious node … attacks prevention
routing protocol by incorporating the FADA algorithm and extending the AODV protocol. …