To see the other types of publications on this topic, follow the link: MANET attacks.

Dissertations / Theses on the topic 'MANET attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'MANET attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Vu, Cong Hoan, and Adeyinka Soneye. "An Analysis of Collaborative Attacks on Mobile Ad hoc Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2407.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that hav
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
3

Ur-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.

Full text
Abstract:
ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communi
APA, Harvard, Vancouver, ISO, and other styles
4

ULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.

Full text
Abstract:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secu
APA, Harvard, Vancouver, ISO, and other styles
5

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Full text
Abstract:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
APA, Harvard, Vancouver, ISO, and other styles
6

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
APA, Harvard, Vancouver, ISO, and other styles
7

Alnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.

Full text
Abstract:
The flexibility of Mobile Ad hoc networks (MANET) and its characteristics introduce new security risks. One possible attack is the Black Hole attack which received recent attention. In the Black Hole attack, a malicious node uses the routing protocol to declare itself as having the shortest path to the node whose packets it wants to intercept. It is needed to understand this risk with a view to extract preventive and corrective protections against it. We introduce an approach that could stop this attack from happening in such a network by using an algorithm which controls the communications be
APA, Harvard, Vancouver, ISO, and other styles
8

Sai, Keerthi T. Divya. "Designing Solutions to Counter the Attacks in Mobile Ad hoc Networks." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5315.

Full text
Abstract:
The open medium, dynamic topology and distributed operation in Mobile Ad hoc Networks (MANET) leads to high risks. Many solutions are proposed to protect a MANET from attacks, ranging from attack identification to prevention. Although these solutions reduce and avoid the attacks in a MANET, sometimes they identify many false attacks as real ones which may cause huge loss of resources. For example, a sudden route breakdown can cause delay in packet delivery; differentiating such a delay from the delay caused by an attacker is difficult. Further, an intelligent attacker could also cause fa
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, Yinghua. "Defending MANETs against flooding attacks by detective measures." 2008. http://arrow.unisa.edu.au:8081/1959.8/45723.

Full text
Abstract:
Mobile ad hoc networks (MANETs), due to their unique characteristics (e.g., unsecured wireless channel, dynamic mobility, absence of central supportive infrastructure and limited resources), are suffering from a wide range of security threats and attacks. Particularly, MANETs are susceptible to the Denial of Service (DoS) attack that aims to disrupt the network by consuming its resources. In MANETs, a special form of DoS attack has emerged recently as a potentially major threat: the flooding attack. This attack recruits multiple attack nodes to flood the MANET with overwhelming broadcast traff
APA, Harvard, Vancouver, ISO, and other styles
10

Hsu, Yu-Wei, and 許祐瑋. "A Study of Black Hole Attacks Prevention in MANETs." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/qqdchv.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>102<br>Nowadays smart devices are becoming more popular and functions are getting more powerful. The most obvious example is our mobile phones, which are not only communication tools but also computing tools with multitasking. Coupled with network services provided by Internet service providers (ISPs), modern people’s dependency upon the Internet and smart devices continue to increase, and the benefits will be inestimable if the enormous resources can be integrated. However, services provided by different ISPs may not form a complete network. In an environment without
APA, Harvard, Vancouver, ISO, and other styles
11

古玉芳. "A Novel Acknowledgment-Based Approach Against Collude Attacks in MANETs." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/24267627333760040790.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>97<br>本篇論文主要探討在無線隨意網路中的路由不良行為和共謀攻 擊。最近數年,在無線隨意網路的安全議題上,已經有許多關於預防 路由不良行為的技術,雖然這些技術普遍能達到不錯的安全防護,但 絕大部分是無法抵擋共謀攻擊的。因此,本篇提出了一種新型態的回 應機制以抵擋無線隨意網路中的共謀攻擊,透過回應封包和時戳比對 兩種技術,同時抵擋並減輕路由不良行為及共謀攻擊所帶來的影響。 最後,將利用安全性分析和實驗結果,評估此新型態回應機制的效能。
APA, Harvard, Vancouver, ISO, and other styles
12

Jiang, Jie-Juang, and 江杰璋. "Study of Different Types of Attacks on Stateless Multicast in MANETs." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/79331415273621217569.

Full text
Abstract:
碩士<br>中國科技大學<br>運籌管理研究所<br>95<br>Multicasting is intended for group-oriented computing. There are more and more applications where one-to-many or many-to-many dissemination is an essential task. Multicast is rapidly becoming an important mode of communication and a good platform for building group-oriented services. To be used for trusted communication, however, current multicast schemes must be supplemented by mechanisms for protecting traffic, controlling participation, and restricting access of unauthorized users to data exchanged by the participants. In this paper, we examine the use of st
APA, Harvard, Vancouver, ISO, and other styles
13

Po-Yen, Chuang, and 莊伯言. "Study of Different Types of Attacks on Tree-based Multicast in MANETs." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/36911283164174130435.

Full text
Abstract:
碩士<br>中國科技大學<br>運籌管理研究所<br>95<br>Security issues in wireless multicast arise due to the use of wireless links that are at risk of being eavesdropped, the inherent broadcast nature of some wireless links lacking control on receivers, and the use of flooding for tree/mesh construction. Security risks include complete loss of service, information stealing or modification, and modification of routing tree/mesh allowing unauthorized users. In this paper, we examine the use of tree-based multicast, MAODV (Multicast Ad-hoc On-Demand Distance Vector), routing protocol in MANETs had different types of
APA, Harvard, Vancouver, ISO, and other styles
14

GUPTA, ANISHI. "GENERIC FRAMEWORK AND MITIGATION ALGORITHM AGAINST BLACK HOLE ATTACK FOR AODV ROUTING PROTOCOL IN MANET." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15729.

Full text
Abstract:
Ad hoc On Demand Vector (AODV) is a demand driven route protocol in Mobile Ad hoc Network (MANET). Adhoc Network is always constraint about resources and threat from malicious nodes and hence light solution is preferably needed. Moreover AODV is susceptible to many attacks such as black hole, gray hole, worm hole and so on. There is always a security threat in adhoc network. For this reason, in this thesis, we propose a new method Extended Modified Enhanced AODV (EMEAODV) which is an extended work of our previous work Modified Enhanced AODV (MEAODV). The new proposed method is effective
APA, Harvard, Vancouver, ISO, and other styles
15

Shabut, Antesar R. M., Keshav P. Dahal, Sanat K. Bista, and Irfan U. Awan. "Recommendation based trust model with an effective defence scheme for MANETs." 2015. http://hdl.handle.net/10454/12964.

Full text
Abstract:
Yes<br>The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as bad-mout
APA, Harvard, Vancouver, ISO, and other styles
16

Qureshi, Basit I., Geyong Min, and Demetres D. Kouvatsos. "Countering the collusion attack with a multidimensional decentralized trust and reputation model in disconnected MANETs." 2013. http://hdl.handle.net/10454/9718.

Full text
Abstract:
No<br>The FIRE trust and reputation model is a de-centralized trust model that can be applied for trust management in unstructured Peer-to-Peer (P2P) overlays. The FIRE model does not, however, consider malicious activity and possible collusive behavior in nodes of network and it is therefore susceptible to collusion attacks. This investigation reveals that FIRE is vulnerable to lying and cheating attacks and presents a trust management approach to detect collusion in direct and witness interactions among nodes based on colluding node's history of interactions. A witness ratings based graph bu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!