To see the other types of publications on this topic, follow the link: ACTIVE attacks in MANET.

Journal articles on the topic 'ACTIVE attacks in MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ACTIVE attacks in MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Full text
Abstract:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
APA, Harvard, Vancouver, ISO, and other styles
2

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
APA, Harvard, Vancouver, ISO, and other styles
3

Harpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.

Full text
Abstract:
In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to han
APA, Harvard, Vancouver, ISO, and other styles
4

Ramachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.

Full text
Abstract:
Security in MANETs is a highly contentious topic in the field of network management. The availability and functionality of a MANET might be compromised by a variety of attacks. One of the most prevalent active attacks used to degrade network speed and reliability is the black hole attack, which leads the compromised agent to discard all data packets. The purpose of a black hole node is to trick other access points into thinking that they must use their node as their route to a certain destination. The black hole node in a cable network cannot be detected or eliminated in an AODV network. We im
APA, Harvard, Vancouver, ISO, and other styles
5

Zalte, S. S., K. Kamat R., and R. Ghorpade V. "Mitigation of DDoS Attack in MANET." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 410–13. https://doi.org/10.35940/ijeat.E95400.089620.

Full text
Abstract:
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MANET) without compromising the packet delivery ratio. MANET inherently has geographically sparse mobile nodes more vulnerable to various attackers more radically the DDoS type. Moreover it emanates open medium, absence of centralized authority, lack of clear line of defense that leads to more vulnerability towards secure environment. Since there are no hindrances for non-legitimate nodes, which allows them to freely enter and exit from the network at anytime, various active attacks like black hole
APA, Harvard, Vancouver, ISO, and other styles
6

Balla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.

Full text
Abstract:
MANET is one of self configuring fastest emerging wireless technology. MANET is multi-hop wireless network of autonomous mobile nodes with no preset infrastructure where each node can move in any direction as well play a role of router. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among pair of nodes. Therefore many proactive, reactive & hybrid routing protocols have been proposed, among which one of well known is AODV due to its high performance gain. Cooperative nature of nodes exposes MANET to various kinds of passive &amp
APA, Harvard, Vancouver, ISO, and other styles
7

Begum, Shifana. "An Efficient & Secure Timer Based baiting Approach to Detect Black Hole Attacks in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (2020): 29–32. http://dx.doi.org/10.46501/ijmtst060607.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the mostwide spread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pr
APA, Harvard, Vancouver, ISO, and other styles
8

Patial, Atul. "Security Techniques in MANET: A Study." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1524–28. http://dx.doi.org/10.22214/ijraset.2021.39567.

Full text
Abstract:
Abstract: MANET (mobile ad hoc network) is considered to be a network with no centralized control. This network typically faces two major challenges related to routing and security. Both these issues affect the performance of this network to a large extent. The black hole attack belongs to the category of active attacks that are launched to reduce the network throughput and other parameters. The research works carried out in the past used different techniques to isolate malicious nodes, but with the inclusion of extra hardware and software tools. The various techniques for the security in MANE
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Bhubneshwar, and Ruhika Badhan. "Different types of Sybili attacks and their importance and properties for finding latest mechanism." International Journal of Advances in Scientific Research 1, no. 9 (2015): 344. http://dx.doi.org/10.7439/ijasr.v1i9.2462.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of the high demand in sharing streaming video and audio in various applications .Once MANET is setup it quickly facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have
APA, Harvard, Vancouver, ISO, and other styles
10

Rao, Tandu Rama, and P. V. Nageswara Rao. "Innovative Technique to Detect and Prevent Malicious Nodes in AOMDV against Blackhole Attacks in MANET for Increase the Network Efficiency." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 9 (2022): 86–94. http://dx.doi.org/10.17762/ijritcc.v10i9.5708.

Full text
Abstract:
The Ad hoc on-demand multipath distance vector (AOMDV) routing protocol is one type of reactive routing protocol used in MANET. It is designed on top of the AODV routing protocol, so it utilizes the features of the AODV protocol. The MANET is a wireless ad hoc network without any physical infrastructure; all nodes can be moved across the network, and connections are made between them as needed simply with the help of RREQ, RREP, and RERR packets. Because the network is dynamic, nodes can quickly join and depart anytime. So far, no security threats have been caused by this feature. The blackhol
APA, Harvard, Vancouver, ISO, and other styles
11

Yasin, Adwan, and Mahmoud Abu Zant. "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique." Wireless Communications and Mobile Computing 2018 (September 6, 2018): 1–10. http://dx.doi.org/10.1155/2018/9812135.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the most widespread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black-hole node aims to fool every node in the network that wants to communicate with another node by pr
APA, Harvard, Vancouver, ISO, and other styles
12

Rajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.

Full text
Abstract:
The procession in the area of internet due to wireless networking technologies gives rise to multiple new applications. In the past few decades, we have found many advance developments in wireless networks. With these developments and large number of applications that are being provided by MANETs, we still face some challenges that have to be overcome. The baseless and active nature of these networks demand new set of networking schemes that should be implemented to provide effective peer-to-peer communication. MANETs hire traditional TCP/IP structure to provide this peer-to-peer communication
APA, Harvard, Vancouver, ISO, and other styles
13

Tuan, Chiu Ching, Kuen Yang Chen, and Yi Chao Wu. "Preventive Security Mechanism Based on AODV." Advanced Materials Research 225-226 (April 2011): 565–68. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.565.

Full text
Abstract:
In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector rou
APA, Harvard, Vancouver, ISO, and other styles
14

G, Jeeva, and Selvaraj K. "INVESTIGATION OF POTENTIAL MULTIPLE THREATS AND THEIR IMPACTS IN MANET." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2407–13. http://dx.doi.org/10.21917/ijct.2021.0356.

Full text
Abstract:
The dynamic nature of mobile ad-hoc network (MANET) provides consistent communication endurance. MANET is renowned for its selfconfigurable formation of interrelated network nodes. This decentralized property of MANET is vulnerable for various types of attacks which could impact the performance of the network and the protection of sensitive data transmitted through the network. The active node adaptation policy of MANET stipulates the possibility of multiple intruder instillations. Any intruder node can generate multiple attacks based on the potential and the rationale of the intrusion. The ob
APA, Harvard, Vancouver, ISO, and other styles
15

K., Thamizhmaran. "Secure Wireless Ad Hoc Sensor Networks." Journal of Sensor Research and Technologies 4, no. 2 (2022): 1–5. https://doi.org/10.5281/zenodo.7207904.

Full text
Abstract:
<em>Our proposed new design PLGPn is suggested, which presents a various mechanisms of resource depletion attacks. This mitigates the various types of attacks by improving an already existing protocol called PLGPa. These are clean slate routing protocols capable of overcoming problems such as carousel attack, stretch attack, directional antenna attack and malicious discovery attack during topology discovery phase. Developing such mechanisms is used to avoid the looping among the nodes in the network by loop-free technique. This scheme provides defense for topology discovery and avoid looping c
APA, Harvard, Vancouver, ISO, and other styles
16

J, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To counteract grey hole and black hole attacks, the proposed method deploys a hybrid framework along with the Ad hoc on-demand distance vector (AODV) routing protocol. A modified protocol is called as SRDAODV (Secure Route Discovery-Adhoc On-Demand Distance Vector).&nbsp;<strong>Methods:</strong>&nbsp;The proposed work establishes secure route from secure node discovery, which protects from sequential attacks. The proposed framework has three significant components Node Authentication, Secure Neighbor discovery and route establishment, and Node Isolat
APA, Harvard, Vancouver, ISO, and other styles
17

Raut, Deepali, and Kapil Hande. "Detection and Prevention of Gray Hole and Black Hole Attack in MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 5029–38. http://dx.doi.org/10.24297/ijct.v13i9.2407.

Full text
Abstract:
An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination.
APA, Harvard, Vancouver, ISO, and other styles
18

Hadi, Raghad Mohammed, Salma Hameedi Abdullah, and Wafaa M. Salih Abedi. "Proposed neural intrusion detection system to detect denial of service attacks in MANETs." Periodicals of Engineering and Natural Sciences (PEN) 10, no. 3 (2022): 70–78. https://doi.org/10.21533/pen.v10.i3.644.

Full text
Abstract:
MANTs are groups of mobiles hosts that arrange themselves into a grid lacking some preexist organization where the active network environment makes it simple in danger by an attacker. A node leaves out, and another node enters in the network, making it easy to penetration. This paper aims to design a new method of intrusion detection in the MANET and avoiding Denial of Service (DoS) basis on the neural networks and Zone Sampling-Based Traceback algorithm (ZSBT). There are several restrictions in outdating intrusion detection, such as time-intense, regular informing, non-adaptive, accuracy, and
APA, Harvard, Vancouver, ISO, and other styles
19

Prasad, KDV, D. Palanikkumar, Dankan Gowda V, Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (2023): 325–35. http://dx.doi.org/10.17762/ijritcc.v11i4s.6575.

Full text
Abstract:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
APA, Harvard, Vancouver, ISO, and other styles
20

Prasad, K. D. V., D. Palanikkumar, Dankan Gowda V., Naziya Hussain, A. Azhagu Jaisudhan Pazhani, and Anil Kumar N. "A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5s (2023): 188–98. http://dx.doi.org/10.17762/ijritcc.v11i5s.6643.

Full text
Abstract:
Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore sus
APA, Harvard, Vancouver, ISO, and other styles
21

Thamizhmaran, K. "Routing Protocol for Multipath in MANET." Journal of Communication Engineering and VLSI Design 1, no. 1 (2023): 24–26. http://dx.doi.org/10.48001/jocevd.2023.1124-26.

Full text
Abstract:
Wireless Sensor Networks using multipath routing technology are vulnerable to Minimum Cost Blocking (MCB). To overcome this issue, the Multipath routing protocol for WSNs is proposed as a security and trust routing mechanism based on active detection. In terms of attacks against blocking, node isolation, and network partitioning, we show that multipath routing methods outperform the traditional protocol. An adversary is regarded successful in our assault model if he or she can capture or isolate a group of nodes such that no more than a specific amount of traffic from the source node reaches t
APA, Harvard, Vancouver, ISO, and other styles
22

Selvavinayaki, Dr K. "An Effectual Data Transmission Approach to Prevent Black Hole Attack in Mobile Adhoc Networks." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 526–40. http://dx.doi.org/10.17762/itii.v9i1.166.

Full text
Abstract:
The dynamic nature of infrastructure in MANET makes security as a critical issue. Due to mobility of nodes, network is easily affected by several types of attacks. In particular black hole attack cause packet dropping, misrouting the information from source to destination. To prevent a network from the effects of the black hole attack, we propose a most reliable data transfer scheme to detect the black hole nodes in the network and ensure the availability, reliability, confidentiality of the information. First, the proposed scheme detects the black hole node using trust active and node recomme
APA, Harvard, Vancouver, ISO, and other styles
23

Rathish, CR, K. Karpagavadivu, P. Sindhuja, and A. Kousalya. "A Hybrid Efficient Distributed Clustering Algorithm Based Intrusion Detection System to Enhance Security in MANET." Information Technology and Control 50, no. 1 (2021): 45–54. http://dx.doi.org/10.5755/j01.itc.50.1.25002.

Full text
Abstract:
MANET plays a key role in the contemporary improvements in technology and services that dynamically builds up the network connection bringing about a variation in network topology. If any malevolent activity inside the network otherwise in the system occurs it is monitored by software application or device called Intrusion or Invader Detection System (IDS). The power utilization is more in MANET as the IDS needs to be active for the whole time on each node. Considering this, we have designed a clustering-based proposal for Ad-hoc networks. To lower the communication overhead, the CH detection
APA, Harvard, Vancouver, ISO, and other styles
24

G., S. Sivagamasundari, and Thamizhmaran K. "Security Attack for Mobile Ad hoc Network using Hybrid Protocol called ZHLP." Journal of Emerging Trends in Electrical Engineering 4, no. 3 (2022): 1–6. https://doi.org/10.5281/zenodo.7349735.

Full text
Abstract:
<em>Mobile Ad-hoc Networks (MANETs) are a type of Wireless ad-hoc network that usually has a routable networking environment on top of an end-to-end Link Layer (LL) ad-hoc network. MANETs consist of a hop-to-hop, self-arrangement and self-configure network in contrast to a mobile network has a central controller. The solutions may not always be sufficient, as ad-hoc networks have their own vulnerabilities that cannot be addressed by these IDS solutions. In the network, some active attacks un-forward capacity nodes pretend to be intermediate nodes of a route to some given targets, drop any pack
APA, Harvard, Vancouver, ISO, and other styles
25

Deepa, J., K. Hemapriya K.Hemapriya, and S. Kaviarasan S.Kaviarasan. "Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes." International Journal of Computer Applications 113, no. 18 (2015): 30–33. http://dx.doi.org/10.5120/19927-2050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liang, Yingbin, H. Vincent Poor, and Lei Ying. "Secrecy Throughput of MANETs Under Passive and Active Attacks." IEEE Transactions on Information Theory 57, no. 10 (2011): 6692–702. http://dx.doi.org/10.1109/tit.2011.2165800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

K.Thamizhmaran. "Efficient Non-Base-Station based Wireless Communication in MANET." Advancement of Signal Processing and its Applications 8, no. 1 (2025): 9–11. https://doi.org/10.5281/zenodo.14650658.

Full text
Abstract:
<em>Due to their intrinsic resource-constrained nature, air medium-based dipole networks have become more prevalent in security-critical applications. As a result, they are vulnerable to a variety of security threats, one of which is the Grey-hole attack, which has a significant impact on data collecting. An active detection-based security and trust routing mechanism called Active Trust is suggested for WSNs in order to overcome that difficulty. NS2 Simulator is used to route security in priority queuing in the scheduling method. In order to achieve quality of service (QoS), the performance of
APA, Harvard, Vancouver, ISO, and other styles
28

Kavita, Babriya, and Singh Surender. "A Review Study on Preventing and Detecting Technique of Black Hole Attack in MANET." International Journal of Trend in Scientific Research and Development 1, no. 4 (2017): 375–79. https://doi.org/10.31142/ijtsrd129.

Full text
Abstract:
There are basically two types of black hole attack i.e. internal black hole and External black hole attack. Black hole is a malicious node that wrongly replies for some route requests without having active route to particular destination and drop all the getting packets. If these malicious nodes work jointly as a collection then the damage will be very risky. This type of attack is called cooperative black hole attack. Black hole attack is a type of active attack. Black hole attack can arise when the malicious node on the path attack the data transfer and purposely drop, delay or change the da
APA, Harvard, Vancouver, ISO, and other styles
29

V, Jayalakshmi, and Abdul Razak T. "Selection of Trusted Nodes in MANET by using Analytic Network Process." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 03 (2014): 657–62. https://doi.org/10.5281/zenodo.14715503.

Full text
Abstract:
MANET is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. The performance of ad hoc networks depends on the cooperative and trust nature of the distributed nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without centralized authorities. In this paper, a novel dynamic trust quantization model with multiple decision factors based on Analytic Network Process (ANP) decision theory is proposed. The multiple decision factors include direct trust, recommendation
APA, Harvard, Vancouver, ISO, and other styles
30

Vaneetha, V., and C. Vivekanandan. "Efficient Interference Prediction Using Bivariate Moment Generating Function in Mobile Ad Hoc Network." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 314–20. http://dx.doi.org/10.1166/jctn.2017.6322.

Full text
Abstract:
To improve the performance of Mobile ad hoc network (MANET), adequate time-varying interference prognoses can active adaptive design for transmission. Normally any inaccurate data transmissions are not identified initially after completion of data transmission that is detected, so lot of energy is wasted for communication. It misbehaves and affects the entire network performance. Proposed Inaccurate Packet Identification based on Pace allocation (IPPA) algorithm, if any Interference occurred that are identified by threshold value of node, node cross its threshold value, detects the attacks. Th
APA, Harvard, Vancouver, ISO, and other styles
31

., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nabeel, Zanoon, Albdour Nashat, S. A. Hamatta Hatem, and Al-Tarawneh RashaMoh'd. "SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND SECURITY SOLUTIONS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 3 (2015): 01–13. https://doi.org/10.5281/zenodo.8162659.

Full text
Abstract:
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed. &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
33

Ghodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.

Full text
Abstract:
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the co
APA, Harvard, Vancouver, ISO, and other styles
34

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the securi
APA, Harvard, Vancouver, ISO, and other styles
35

Sandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.

Full text
Abstract:
An ordinary, self-orbiting communication network with the ability to manage mobile nodes is called a mobile ad-hoc network (MANET). The vulnerability of the MANET to various threats and attacks is addressed by numerous proposed protocols. The malicious node takes advantage of these weaknesses to launch attacks, such as wormhole attacks, particularly when nodes are mobile and the network's topology is unstable. The termite method for detecting wormhole attacks in MANETs is presented in this research. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
36

Arudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.

Full text
Abstract:
Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MAN
APA, Harvard, Vancouver, ISO, and other styles
37

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Full text
Abstract:
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
APA, Harvard, Vancouver, ISO, and other styles
38

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols ar
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
40

Ancy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.

Full text
Abstract:
MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANE
APA, Harvard, Vancouver, ISO, and other styles
41

Kakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.

Full text
Abstract:
Security is a weak link of network systems. The malicious usage and attacks have caused tremendous loss by impairing the functionalities of the computer networks. Among all network attacks, Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to network functionality. Mobile Ad Hoc networks are even more vulnerable to these attacks. Existing MANET routing protocols, such as Ad Hoc On-Demand Distance Vector Routing Protocol (AODV), do not provide enough security defense capacity. AODV is inherently vulnerable to many attacks viz. authentication, availab
APA, Harvard, Vancouver, ISO, and other styles
42

Jain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.

Full text
Abstract:
Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show perfo
APA, Harvard, Vancouver, ISO, and other styles
43

Shrivastava, Neha, and Anand Motwani. "Survey of Malicious Attacks in MANET." International Journal of Computer Applications 80, no. 14 (2013): 28–30. http://dx.doi.org/10.5120/13931-1916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Arora, Jasleen, Paramjeet Singh, and Shaveta Rani. "Detecting and Preventing Attacks in MANET." International Journal of Computer Applications 81, no. 5 (2013): 14–18. http://dx.doi.org/10.5120/14007-2056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hemalatha, S., Harikumar Pallathadka, Rajesh P. Chinhewadi, D. Kalaiyarasi, and B. Anni Princy. "Challenges on Missing Packet Detection or Packet Dropping Attacks in Mobile Adhoc Network -A Survey." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 676–80. http://dx.doi.org/10.17762/ijritcc.v11i8s.7255.

Full text
Abstract:
Collection of wireless nodes forms together to communicate each other in the network without infrastructure less and any access point along with the characteristics of freedom in mobility is called Mobile Adhoc Network. Transmitting of packets from source to destination plays the vital role in MANET. When a Packet is not delivered properly at the destination , its affects the performance of the MANET. Due to this characteristics of the mobility nodes can subject to falls on the packet missing also the various packets dropping security attacks take part in the dropping the packets while communi
APA, Harvard, Vancouver, ISO, and other styles
46

A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.

Full text
Abstract:
Mobile Ad hoc Networks are widely used in defense applications where traditional wireless network is difficult to implement as the network is formed by autonomous and decentralized wireless nodes. Privacy and Security in MANET are the most important disquiet for basic functionality of the network. Security is the major challenge in MANETs because of its characteristics like resource constraints, open medium, lack of fixed infrastructure, dynamism of topology and no clear security mechanism. As the topology is dynamic, routing process is very difficult. So MANET often suffers from routing attac
APA, Harvard, Vancouver, ISO, and other styles
47

Punya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.

Full text
Abstract:
Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first and then some protection mechanisms against those attacks are discussed. Comparisons
APA, Harvard, Vancouver, ISO, and other styles
48

Baba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.

Full text
Abstract:
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication and mobility to all devices forming the network. MANET suffers security lapses due to the absence of central control infrastructure to monitor and control the devices that joins the network. These security lapses in MANET discourage it and makes it vulnerable to attacks such as denial of service attacks. Amongst various attacks prevalent on MANET environment, packet flooding is a com
APA, Harvard, Vancouver, ISO, and other styles
49

Suganya, D., and A. V. Santhosh Babu. "Performance Comparison of Secure Communication in Mobile Ad Hoc NETwork Using Intrusion Detection Techniques." Sensor Letters 18, no. 4 (2020): 273–79. http://dx.doi.org/10.1166/sl.2020.4227.

Full text
Abstract:
In recent years, wireless networks are the key concern in communication field. Mobile Ad Hoc NETwork (MANET) comprised number of wireless nodes to communicate with each other for information exchange. MANET is temporary network constructed for particular purpose and no need of any pre-established infrastructure. MANET became well-liked technology due to its flexibility for various applications. The flexibility brings new security threats in MANET. Intrusion detection system used to identify and prevent the security attacks at different levels. IDS needed continuous monitoring which resulted in
APA, Harvard, Vancouver, ISO, and other styles
50

Safdar Malik, Tauqeer, Muhammad Nasir Siddiqui, Muhammad Mateen, Kaleem Razzaq Malik, Song Sun, and Junhao Wen. "Comparison of Blackhole and Wormhole Attacks in Cloud MANET Enabled IoT for Agricultural Field Monitoring." Security and Communication Networks 2022 (April 29, 2022): 1–18. http://dx.doi.org/10.1155/2022/4943218.

Full text
Abstract:
In Mobile Ad hoc Network (MANET) enabled Internet of Things (IoT) agricultural field monitoring, sensor devices are automatically connected and form an independent network that serves as a cloud for many services such as monitoring, securing, and properly maintaining. Cloud-based services in MANET models can prove to be an extremely effective way of smart agricultural functionalities for device-to-device information exchange. Security is a serious issue with Cloud-MANET-based IoT since nodes are scattered, mobile, and lacking centralized administrator, which makes it possible for data tamperin
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!