Literature review of routing attacks in MANET

RK Singh, P Nand - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobile Ad-hoc Network (MANET) is based on the routing algorithm which adapts the
random changes that may occur in the network topology. MANET is the network with the …

A study on improving secure routing performance using trust model in MANET

H Yang - Mobile Information Systems, 2020 - Wiley Online Library
MANET is utilized in many fields because of its advantage in quickly establishing networks.
The network will perform well if mobile nodes trust each other and act cooperatively …

SAODV: Black hole and gray hole attack detection protocol in MANETs

S Dhende, S Musale… - … signal processing and …, 2017 - ieeexplore.ieee.org
A MANET is a group of wireless mobile nodes which cooperate in forwarding packets over a
wireless links. Due to the lack of an infrastructure and open nature of MANET, security has …

A DSR‐based routing protocol for mitigating blackhole attacks on mobile ad hoc networks

I Woungang, SK Dhurandher… - Security and …, 2016 - Wiley Online Library
A mobile ad hoc network is a collection of mobiles, autonomous nodes that communicate in
a cooperative manner over a wireless channel without any fixed infrastructure, nor built‐in …

Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack

M Wazid, V Kumar, RH Goudar - 2012 2nd IEEE International …, 2012 - ieeexplore.ieee.org
A mobile ad hoc network is much more assailable to attacks than a wired network due to its
limited physical security, high mobility and lack of centralized administration. Jellyfish is a …

Trust-based-tuning of Bayesian-watchdog intrusion detection for fast and improved detection of black hole attacks in mobile ad hoc networks

R Makani, BVR Reddy - International Journal of Advanced …, 2022 - inderscienceonline.com
The'watchdog'is a well-known intrusion detection mechanism for mobile ad hoc networks
(MANET), which not only monitors the traffic between peer nodes but also performs analysis …

Secure routing to avoid black hole affected routes in MANET

SR Deshmukh, PN Chatur - 2016 Symposium on Colossal …, 2016 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are becoming popular with proliferation of mobile
devices. MANETs have infrastructure less property which makes them easily deployable and …

A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission

A Katal, M Wazid, RH Goudar… - 2013 IEEE Conference …, 2013 - ieeexplore.ieee.org
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the
entire network performance. Dropping attack either Packet Dropping or Datagram Dropping …

A survey on black hole attack in mobile ad hoc networks

SL Dhende, SD Shirbahadurkar… - … on Recent Advances …, 2018 - ieeexplore.ieee.org
A MANET consists of a group of wireless mobile nodes. These nodes are arbitrarily moving
and communicating one another over wireless links. Due to some unique characteristics …

BETA random waypoint mobility model for wireless network simulation

RT Silva, RR Colletti, C Pimentel, RM de Moraes - Ad Hoc Networks, 2016 - Elsevier
It is widely known that the instantaneous average node speed for the random waypoint
(RWP) mobility model may not reach a steady state regime due to velocity gradual decaying …