To see the other types of publications on this topic, follow the link: MANET attacks.

Journal articles on the topic 'MANET attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MANET attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
2

Sandhu, Gurgeet Kaur. "Enhancing Mobile Ad Hoc Network Security: A Study on Termite Colony Optimization for Wormhole Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31662.

Full text
Abstract:
An ordinary, self-orbiting communication network with the ability to manage mobile nodes is called a mobile ad-hoc network (MANET). The vulnerability of the MANET to various threats and attacks is addressed by numerous proposed protocols. The malicious node takes advantage of these weaknesses to launch attacks, such as wormhole attacks, particularly when nodes are mobile and the network's topology is unstable. The termite method for detecting wormhole attacks in MANETs is presented in this research. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
3

Ancy Breen, W., S. Durga Devi, E. Sushmitha, and V. Suveetha. "Reducing the Effectiveness of Gray-Hole Attack in Manet." International Journal of Engineering & Technology 7, no. 3.34 (2018): 305. http://dx.doi.org/10.14419/ijet.v7i3.34.19213.

Full text
Abstract:
MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANE
APA, Harvard, Vancouver, ISO, and other styles
4

V, Suresh Kumar, Rajesh Khanna M, and Saravanan R. "Security Concerns and Remedial Measures in MANETs Using Intrusion Detection." ECS Transactions 107, no. 1 (2022): 1459–66. http://dx.doi.org/10.1149/10701.1459ecst.

Full text
Abstract:
In this research paper, we discussed the guaranteed reliable communication between nodes by constructing the black hole attack free route in MANET. To achieve this, a Hybrid Intrusion Detection System (HIDS) technique has been proposed to detect and remove the black hole attack nodes in the routing path. In MANETs, a novel cluster leader election process has been proposed. This election process is based on the node with maximum energy level. One of the important functionality is security in MANET. Due to many different attacks in the routing path, MANET becomes unsecure. Understanding the form
APA, Harvard, Vancouver, ISO, and other styles
5

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
APA, Harvard, Vancouver, ISO, and other styles
6

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the securi
APA, Harvard, Vancouver, ISO, and other styles
7

M. Shivashankar, Et al. "Evading and Averting the Sybil Attack in Manets Using Mac Hash Message Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1160–66. http://dx.doi.org/10.17762/ijritcc.v11i9.9025.

Full text
Abstract:
The security loopholes present in the wireless network especially MANET makes it vulnerable and weak. Most of the users are much concerned about the very security of the network and hesitate to participate actively in the transactions. Very powerful and strange attacks are pinpointed by many research scholars in the past. The Sybil attack is one of the most detrimental attacks imparted on MANETS where plethora of authentic nodes are faked and forged to enable illegal entry into a network to disrupt the very security of the MANET. The Sybil attack acts and simulates like an existing node presen
APA, Harvard, Vancouver, ISO, and other styles
8

Murugesan, Punitha, Callins Christiyana Chelladurai, Priyadharsini Kuluchamy, and Umesh Rajendran. "SECURING MOBILE AD-HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS." ICTACT Journal on Communication Technology 15, no. 1 (2024): 3097–103. http://dx.doi.org/10.21917/ijct.2024.0461.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) are susceptible to various security threats due to their decentralized and dynamic nature. Among these threats, Distributed Denial of Service (DDoS) and sibling attacks pose significant challenges to the integrity and availability of network services. This paper presents a novel approach for securing MANETs against DDoS and sibling attacks through a robust Intrusion Prevention System (IPS) integrated with a secured routing mechanism. The proposed methodology leverages residual transfer learning to adapt a pre-trained model for intrusion detection to the MANET en
APA, Harvard, Vancouver, ISO, and other styles
9

Kancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (2022): 3480. http://dx.doi.org/10.3390/electronics11213480.

Full text
Abstract:
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this rega
APA, Harvard, Vancouver, ISO, and other styles
10

Yusri Dak, Ahmad, Noor Elaiza Abdul Khalid, and Saadiah Yahya. "Integrated Combined Layer Algorithm (ICLA) for Jamming Detection in MANET." International Journal of Engineering & Technology 7, no. 3.15 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i3.15.17400.

Full text
Abstract:
The nature of MANETs such as open medium, dynamic mobility and lack of security makes it susceptible to a range of attacks. Jamming attacks is recorded as the highest occurring attacks that exist at physical and MAC layers in MANET. Therefore, an integrated combined layer algorithm (ICLA) is proposed using reverse engineering and anomaly detection technique. The methodology begins by collecting data through OPNET. Analysis and evaluation of the data produces three jammers detection Metrics which are used detect jammers. The performance of the outcome are then tested against other jammers’ mode
APA, Harvard, Vancouver, ISO, and other styles
11

Zain, Alaa, Heba El-khobby, Hatem M. Abd Elkader, and Mostafa Abdelnaby. "MANETs performance analysis with dos attack at different routing protocols." International Journal of Engineering & Technology 4, no. 2 (2015): 390. http://dx.doi.org/10.14419/ijet.v4i2.4609.

Full text
Abstract:
A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link S
APA, Harvard, Vancouver, ISO, and other styles
12

Ahmed, N. Syed Siraj, and Debi Prasanna Acharjya. "A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set." International Journal of Information Security and Privacy 13, no. 4 (2019): 28–52. http://dx.doi.org/10.4018/ijisp.2019100103.

Full text
Abstract:
The topology changes randomly and dynamically in a mobile adhoc network (MANET). The composite characteristics of MANETs makes it exposed to interior and exterior attacks. Avoidance support techniques like authentication and encryption are appropriate to prevent attacks in MANETs. Thus, an authoritative intrusion detection model is required to prevent from attacks. These attacks can be at either the layers present in the network or can be of a general attack. Many models have been developed for the detection of intrusion and detection. These models aim at any one of the layer present in the ne
APA, Harvard, Vancouver, ISO, and other styles
13

Dulaimi, Layth A. Khalil Al, R.Badlishah Ahmad, Naimah Yaakob, Mohd Hafiz Yusoff, and Mohamed Elshaikh. "Black hole attack behavioral analysis general network scalability." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 2 (2019): 677–82. https://doi.org/10.11591/ijeecs.v13.i2.pp677-682.

Full text
Abstract:
A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and m
APA, Harvard, Vancouver, ISO, and other styles
14

Hijazi, Sherin, Mahmoud Moshref, and Saleh Al-Sharaeh. "Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 1 (2017): 7535–47. http://dx.doi.org/10.24297/ijct.v16i1.5728.

Full text
Abstract:
Mobile Ad-hoc Network (MANET) is a kind of wireless network that has the most challenging network infrastructure. It is formed using the mobile nodes without any centralized administration from the security perspective and is a self-configuring fastest emerging wireless technology, each node on the MANET will act like a router which forwards the packets. Dynamic nature of this network makes routing protocols to play a prominent role in setting up efficient route among a pair of nodes. Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector (ADOV) is a reactive MANET routing protocols
APA, Harvard, Vancouver, ISO, and other styles
15

Kumari, Ankita, Sandip Dutta, and Soubhik Chakraborty. "A comparative study of different security issues in MANET." International Journal of Experimental Research and Review 31, Spl Volume (2023): 168–86. http://dx.doi.org/10.52756/10.52756/ijerr.2023.v31spl.016.

Full text
Abstract:
In a MANET (Mobile Ad-Hoc Network), an intruder can attempt to gain unlawful access to the network to obtain sensitive information. These attacks can occur at various network layers, and different attacks can be carried out. To mitigate the risks of such attacks, several solutions have been proposed. It can be characterized by dynamic topology, meaning that the network is formed by a group of nodes communicating wirelessly and without centralized control. This feature makes MANETs highly vulnerable to attacks, especially when malicious nodes are introduced into the network. These malicious nod
APA, Harvard, Vancouver, ISO, and other styles
16

Hanafi, Abdulfatai Shola, Yakub Kayode Saheed, and Micheal Olaolu Arowolo. "An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 19 (2023): 123–35. http://dx.doi.org/10.3991/ijim.v17i19.27663.

Full text
Abstract:
A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices communicating in a distributed fashion across numerous hops. MANETs are an appealing technology for many applications, including rescue operations, environmental monitoring, tactical operations, and so on, because they let people communicate without the usage of permanent infrastructure. This flexibility, however, creates additional security vulnerabilities. Because of its benefits and expanding demand, MANETs have attracted a lot of interest from the scientific community. They do, however, seem to be more vulner
APA, Harvard, Vancouver, ISO, and other styles
17

Pazhanisamy, K., and Dr Latha Parthiban. "Mobile Ad Hoc Networks Intrusion Detection in Co-Operative Motion." Alinteri Journal of Agriculture Sciences 36, no. 2 (2021): 76–81. http://dx.doi.org/10.47059/alinteri/v36i2/ajas21117.

Full text
Abstract:
As the number of wireless devices continues to increase rapidly, mobile ad hoc networking (MANET) has emerged as an exciting and significant technological advance. MANETs were susceptible to attacks because of their open media, continuously changing network design, cooperation mechanisms, lack of a protective measure and management point, and a coherent layer of attack. However, regular functioning frequently generates traffic corresponding to a "signature attack," which leads to false alerts. One of the significant disadvantages is the inability to identify new attacks without established sig
APA, Harvard, Vancouver, ISO, and other styles
18

Ghodichor, Nitesh, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, and Ankush Sawarkar. "Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET." International journal of Computer Networks & Communications 15, no. 2 (2023): 127–46. http://dx.doi.org/10.5121/ijcnc.2023.15207.

Full text
Abstract:
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the co
APA, Harvard, Vancouver, ISO, and other styles
19

Ramachandran, Dhanagopal, Sasikumar S, Vallabhuni Rajeev Ratna, et al. "A Low-Latency and High-Throughput Multipath Technique to Overcome Black Hole Attack in Mobile Ad Hoc Network (MTBD)." Security and Communication Networks 2022 (August 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/8067447.

Full text
Abstract:
Security in MANETs is a highly contentious topic in the field of network management. The availability and functionality of a MANET might be compromised by a variety of attacks. One of the most prevalent active attacks used to degrade network speed and reliability is the black hole attack, which leads the compromised agent to discard all data packets. The purpose of a black hole node is to trick other access points into thinking that they must use their node as their route to a certain destination. The black hole node in a cable network cannot be detected or eliminated in an AODV network. We im
APA, Harvard, Vancouver, ISO, and other styles
20

Arudra, Annepu, and Mishra Priti. "Black Hole Attacks on MANETs: Analysis and Prevention." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 3 (2022): 17–23. https://doi.org/10.35940/ijeat.C3341.0211322.

Full text
Abstract:
Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MAN
APA, Harvard, Vancouver, ISO, and other styles
21

Sah, Raja Ram, Devendra Kumar Sahu, Nanda Satish Kulkarni, K. Venkata Ramana, Shikha Maheshwari, and Nagarjuna E. "OPTIMIZING MANET PERFORMANCE WITH IMPROVISED ALGORITHMIC INNOVATIONS FOR ENHANCED CONNECTIVITY AND SECURITY." ICTACT Journal on Communication Technology 15, no. 2 (2024): 3195–99. http://dx.doi.org/10.21917/ijct.2024.0476.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) face significant challenges in maintaining connectivity and security due to their dynamic and decentralized nature. Passive attacks, such as eavesdropping and traffic analysis, pose a critical threat to MANET. This study proposes a novel algorithm, Radial ResNet, tailored for the classification of passive attacks in MANETs. The algorithm integrates radial basis function networks with residual networks (ResNet) to enhance classification accuracy and efficiency. Experimental results demonstrate the effectiveness of Radial ResNet, achieving an average classificatio
APA, Harvard, Vancouver, ISO, and other styles
22

., Mohd Faisal. "ATTACKS IN MANET." International Journal of Research in Engineering and Technology 02, no. 10 (2013): 273–76. http://dx.doi.org/10.15623/ijret.2013.0210040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.

Full text
Abstract:
Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show perfo
APA, Harvard, Vancouver, ISO, and other styles
24

A.Priyadharshini. "A Survey of Security Issues in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 3, no. 12 (2018): 357–60. https://doi.org/10.5281/zenodo.2456305.

Full text
Abstract:
Mobile Ad hoc Networks are widely used in defense applications where traditional wireless network is difficult to implement as the network is formed by autonomous and decentralized wireless nodes. Privacy and Security in MANET are the most important disquiet for basic functionality of the network. Security is the major challenge in MANETs because of its characteristics like resource constraints, open medium, lack of fixed infrastructure, dynamism of topology and no clear security mechanism. As the topology is dynamic, routing process is very difficult. So MANET often suffers from routing attac
APA, Harvard, Vancouver, ISO, and other styles
25

Eltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (2023): 1956. http://dx.doi.org/10.3390/electronics12091956.

Full text
Abstract:
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs’ nodes create on-the-fly connections with each other to share information, and they frequently join and leave MANET during run time. Therefore, flexibility in MANETs is needed to be able to handle variations in the number of existing network nodes. An effective routing protocol should be used to be able to route data packets within this dynamic network. Lacking centralized infrastructure in MANETs m
APA, Harvard, Vancouver, ISO, and other styles
26

Yazdanypoor, Mohammad, Stefano Cirillo, and Giandomenico Solimando. "Developing a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks." Applied Sciences 14, no. 17 (2024): 7982. http://dx.doi.org/10.3390/app14177982.

Full text
Abstract:
Mobile ad hoc networks (MANETs) have revolutionized wireless communications by enabling dynamic, infrastructure-free connectivity across various applications, from disaster recovery to military operations. However, these networks are highly vulnerable to security threats, particularly black hole and gray hole attacks, which can severely disrupt network performance and reliability. This study addresses the critical challenge of detecting and mitigating these attacks within the framework of the dynamic source routing (DSR) protocol. To tackle this issue, we propose a robust hybrid detection meth
APA, Harvard, Vancouver, ISO, and other styles
27

Punya, Peethambaran, and Jayasudha J. S. Dr. "SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES." International Journal of Network Security & Its Applications (IJNSA) 6, no. 3 (2014): 19–29. https://doi.org/10.5281/zenodo.6601108.

Full text
Abstract:
Mobile ad hoc networks (MANETs) turn out to be very useful in the current application areas for networks that require ad hoc connectivity as well as mobility. While the MANET routing protocols were designed it was assumed that there is no chance to have a malicious node in the network that does not co operate with each other to transmit data. Because of this fact, the network layer of MANETs is vulnerable to attacks of several kinds. Here in this paper, different kinds of attacks on MANETs are discussed first and then some protection mechanisms against those attacks are discussed. Comparisons
APA, Harvard, Vancouver, ISO, and other styles
28

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols ar
APA, Harvard, Vancouver, ISO, and other styles
29

Nigahat*, Dr. Dinesh Kumar. "A REVIEW ON BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS (MANET)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 556–61. https://doi.org/10.5281/zenodo.439243.

Full text
Abstract:
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, we focus on Black Hole attack in Mobile adhoc networks. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing att
APA, Harvard, Vancouver, ISO, and other styles
30

Niranjan, Panda, and Kumar Pattanayak Binod. "Analysis of Blackhole Attack in AODV and DSR." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3092–102. https://doi.org/10.11591/ijece.v8i5.pp3092-3102.

Full text
Abstract:
Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic So
APA, Harvard, Vancouver, ISO, and other styles
31

Harpal, Gaurav Tejpal, and Sonal Sharma. "A Survey Study on Attacks in MANET Ad-Hoc Network." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 387. http://dx.doi.org/10.23956/ijarcsse/v7i7/0228.

Full text
Abstract:
In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to han
APA, Harvard, Vancouver, ISO, and other styles
32

T, Ramya. "Prevention of Cooperative E Black Hole Attacks and Emerging efficient in MANETs." Shanlax International Journal of Arts, Science and Humanities 6, S1 (2018): 58–60. https://doi.org/10.5281/zenodo.1410971.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the networks at any point in time. The generic characteristic of MANET has rendered it vulnerable to security attacks. In this paper, we address the problem of coordinated attack by multiple black holes acting a group. We present a technique to identify several black holes cooperating with each other and a solution to discover a safe route avoiding cooperative black hole attack. 
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Gurvir, and Tajinder Kaur. "Termite-Based Approach for Wormhole Attack Detection in Mobile Ad-Hoc Networks (MANETs)." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42378.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are regular, self-orbiting communication networks that may control mobile nodes. Many protocols have been developed to alleviate the MANET's susceptibility to different risks & attacks. When nodes are mobile or the network architecture is unstable, the hostile node exploits these flaws to initiate assaults, including wormhole assaults. This study presents the termite approach for wormhole detection in MANETs. Keywords: MANET, Denial of service, Wormhole attack, Termite approach
APA, Harvard, Vancouver, ISO, and other styles
34

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in M
APA, Harvard, Vancouver, ISO, and other styles
35

Khan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, et al. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.

Full text
Abstract:
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited battery power, mobility, dynamic topology, open media, and so on. Numerous MANET-related a
APA, Harvard, Vancouver, ISO, and other styles
36

Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a network consisting of a group of mobile nodes that don't have a fixed infrastructure. This causes the MANET to be vulnerable to attacks that can interfere with the process of communication and data transmission on the network. One type of attack that can attack the MANET is a wormhole attack. The wormhole is an attack on a network where there are two or more wormhole nodes that are interconnected and work together to attack network traffic or discard data packets it receives. Each wormhole node will be connected to each other using a wormhole link. To prevent
APA, Harvard, Vancouver, ISO, and other styles
37

Biswaraj, Sen, Sharma Kalpana, and Kanti Ghose Mrinal. "A SIMPLE APPROACH TO DEFEND BLACKHOLE ATTACK IN MANETS." International Journal of Engineering Sciences & Research Technology 5, no. 2 (2016): 813–18. https://doi.org/10.5281/zenodo.46527.

Full text
Abstract:
The interest in the field of Mobile Ad hoc Network (MANET) is growing since last few years because of its practical applications in mobile devices. MANET  is  particularly  vulnerable  to  security attacks  in  comparison  to  wired  network  or infrastructure-based  wireless  network  due  to  its fundamental characteristics such as the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. In order to provide secure and good communication and   transmi
APA, Harvard, Vancouver, ISO, and other styles
38

Lalu Prasad, Jammana, Kavitha Chekuri, and Lakshmana Rao Rowthu. "INFLUENCE WITH TRAFFIC RATE AND BEACON TIME FOR JAMMING ATTACK ON 802.11B IN MOBILE AD HOC NETWORKS." International Journal of Engineering Applied Sciences and Technology 8, no. 1 (2023): 100–105. http://dx.doi.org/10.33564/ijeast.2023.v08i01.017.

Full text
Abstract:
MANETs have distinctive characteristics like dynamic topology, wireless radio medium, restricted resources and lack of centralized administration; as a result, they're liable to differing types of attacks in several layers of protocol stack. Every node in a Manet is capable of acting as a router. The need for a secure Manet networks is powerfully tied to the protection and privacy options. This Jamming attacks are one in every of them. These occur by transmittal continuous radio ways in which to inhibit the transmission among sender and receiver. These attacks have an effect on the network by
APA, Harvard, Vancouver, ISO, and other styles
39

Sowah, Robert A., Kwadwo B. Ofori-Amanfo, Godfrey A. Mills, and Koudjo M. Koumadi. "Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)." Journal of Computer Networks and Communications 2019 (January 20, 2019): 1–14. http://dx.doi.org/10.1155/2019/4683982.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges. These networks are more susceptible to attacks such as black hole and man-in-the-middle (MITM) than their corresponding wired networks. This is due to the decentralized nature of their overall architecture. In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for cont
APA, Harvard, Vancouver, ISO, and other styles
40

Pal, Arunangshu, and Prasenjit Choudhury. "Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph." Mapana - Journal of Sciences 11, no. 4 (2012): 65–76. http://dx.doi.org/10.12723/mjs.23.5.

Full text
Abstract:
With the advancement of wireless technologies, Mobile Ad hoc NETwork (MANET) has been an important field of study. MANETs find useful applications in the real world, for example in military battlefield and disaster management. Since MANET is dynamic in nature, it must be represented by dynamic graph. Evolving graph, a form of dynamic graph, may be used for the purpose. When we talk about a network, a routing protocol comes into the question, and one of the most popular routing protocols is AODV. However, since AODV suffers from a drawback that it may be a victim of black hole attack, we need t
APA, Harvard, Vancouver, ISO, and other styles
41

Vijayan, P., Dr P. Anbalagan, and Dr S. Selvakumar. "An Ensembled Optimization Algorithm for Secured and Energy Efficient Low Latency MANET with Intrusion Detection." Journal of Internet Services and Information Security 12, no. 4 (2022): 156–63. http://dx.doi.org/10.58346/jisis.2022.i4.011.

Full text
Abstract:
The property of dynamic infrastructure that adjusts the network automatically and allows for faster deployment has made Mobile ad hoc networks (MANETs) extremely fitting for locations that don’t have support for radio communication due to disasters or other crises. Since the topology is dynamic, security is one of the major concerns in MANET which will be exposed for various attacks like eavesdropping, routing based attacks and modification of executables. Though MANET is vulnerable to these attacks, another major issue to be addressed is the attacks based on intrusion. The proposed model uses
APA, Harvard, Vancouver, ISO, and other styles
42

KONATE, Karim, and GAYE Abdourahime. "Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 12 (2014): 1425–30. https://doi.org/10.5281/zenodo.14768452.

Full text
Abstract:
The present work is dedicated to study attacks and countermeasures in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a table which summarizes the advantages and the disadvantages of the mechanisms proposed were presented. 
APA, Harvard, Vancouver, ISO, and other styles
43

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
44

Srividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This
APA, Harvard, Vancouver, ISO, and other styles
45

Kakkar, Parveen, Pooja Sharma, and Krishan Saluja. "Vulnerability Assessment of Routing Protocols in MANET." RESEARCH REVIEW International Journal of Multidisciplinary 03, no. 11 (2018): 285–91. https://doi.org/10.5281/zenodo.1489366.

Full text
Abstract:
Security is a weak link of network systems. The malicious usage and attacks have caused tremendous loss by impairing the functionalities of the computer networks. Among all network attacks, Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to network functionality. Mobile Ad Hoc networks are even more vulnerable to these attacks. Existing MANET routing protocols, such as Ad Hoc On-Demand Distance Vector Routing Protocol (AODV), do not provide enough security defense capacity. AODV is inherently vulnerable to many attacks viz. authentication, availab
APA, Harvard, Vancouver, ISO, and other styles
46

Abdelhaq, Maha, Raed Alsaqour, Mada Alaskar, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.

Full text
Abstract:
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Pro
APA, Harvard, Vancouver, ISO, and other styles
47

Maha, Abdelhaq, Alsaqour Raed, Alaskar Mada, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844–52. https://doi.org/10.11591/ijece.v10i5.pp4844-4852.

Full text
Abstract:
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Pro
APA, Harvard, Vancouver, ISO, and other styles
48

Nigahat*, Dr. Dinesh Kumar. "BLACK HOLE DETECTION AND PREVENTION USING ADOV AND SHORTEST DISTANCE TECHNIQUE." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 314–19. https://doi.org/10.5281/zenodo.546354.

Full text
Abstract:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secu
APA, Harvard, Vancouver, ISO, and other styles
49

Ch, Asha Jyothi, and Narsimha G. "Two-Party Key Agreement Protocol Without Central Authority for Mobile Ad Hoc Networks." International Journal of Information Security and Privacy 13, no. 4 (2019): 68–88. http://dx.doi.org/10.4018/ijisp.2019100105.

Full text
Abstract:
Key agreement (KA) without the use of a central authority is an elementary cryptographic problem to ensure security in MANETs because such networks consist of movable nodes with no fixed infrastructure or no central administration. The nodes communicate via wireless channels that are more prone to security attacks. A majority of the existing KA protocols assume the existence of central authority and hence, not perfectly suitable for a MANET environment. Proposed 2P-NCKA (Two-Party Non-Central authority KA) protocol creates a secret key between two users for a MANET which does not assume the us
APA, Harvard, Vancouver, ISO, and other styles
50

Sahu, Deeksha, Rajneesh Pachouri, and Anurag Jain. "Detection and Isolating Flood Rushing Attacks in WSN Using Timer Based Trolling Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 427–35. http://dx.doi.org/10.22214/ijraset.2022.46209.

Full text
Abstract:
Abstract: The Mobile Ad hoc Network (MANET) is a wireless network component that offers a variety of applications in numerous industries. Perhaps the biggest problem with networks was the security of MANET. MANET is defenceless against many attacks that affect its availability and functionality. The black hole attack is one of the most dangerous dynamic assaults since it prevents the network from being presented and reliable because the malicious node drops all incoming data packets. By ensuring that it always has the best path to the target node, the black hole attack aims to trick every node
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!