To Study the Various Attacks and Protocols in MANET
Harkiranpreet Kaur1 , Rasneet Kaur2
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-4 , Page no. 210-212, Apr-2016
Online published on Apr 27, 2016
Copyright © Harkiranpreet Kaur , Rasneet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Harkiranpreet Kaur , Rasneet Kaur, “To Study the Various Attacks and Protocols in MANET,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.210-212, 2016.
MLA Style Citation: Harkiranpreet Kaur , Rasneet Kaur "To Study the Various Attacks and Protocols in MANET." International Journal of Computer Sciences and Engineering 4.4 (2016): 210-212.
APA Style Citation: Harkiranpreet Kaur , Rasneet Kaur, (2016). To Study the Various Attacks and Protocols in MANET. International Journal of Computer Sciences and Engineering, 4(4), 210-212.
BibTex Style Citation:
@article{Kaur_2016,
author = {Harkiranpreet Kaur , Rasneet Kaur},
title = {To Study the Various Attacks and Protocols in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {210-212},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=888},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=888
TI - To Study the Various Attacks and Protocols in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Harkiranpreet Kaur , Rasneet Kaur
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 210-212
IS - 4
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1452 | 1389 downloads | 1483 downloads |
Abstract
MANET is a network which has no central coordinator and the nodes are free to move in any direction because there is no fixed infrastructure. There are various types of attacks which can easily harm the security of the network. Sender sends a packet to the destination by using the best path with the help of routing protocols. In this review paper, numerous attacks will be discussed.
Key-Words / Index Term
MANET, Attacks, DSR, infrastructure-less
References
[1] Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”, IEEE, 2009
[2] Amandeep Singh Bhatia and Rupinder Kaur Cheema,“Analyzing and Implementing the Mobility over MANETS using Random Way Point Model”,International Journal of Computer Applications (0975 – 8887) Volume 68– No.17, April 2013
[3] Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security, Volume-9, No- 4 (2011): 106-110.
[4] Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014, E-ISSN: 2347-2693
[5] Caimu Tang,Dapeng Oilver “An Efficient Mobile Authentication Scheme for Wireless Networks”,IEEE, 2011
[6] Dr. A.K Verma, “Mobile Adhoc Networks: An Introduction”, 2003
[7] Erik G. Nilsson and Ketil Stølen, “Ad Hoc Networks and Mobile Devices in Emergency Response – a Perfect Match”
[8] Sharma, Pradeep Kumar, Shivlal Mewada, and Pratiksha Nigam. "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network." International Journal of Scientific Research in Network Security and Communication, Volune-1. Issue-4 (2013): 8-11.
[9] Ian D. Chakeres and Elizabeth M. Belding-Royer , “AODV Routing Protocol Implementation Design”, In C. E. Perkins, editor, Ad hoc Networking, pages 173.219. Addison-Wesley, 2004