Open Access   Article Go Back

A Survey On Network Layer Attack Detection And Isolation Techniques In MANET

R. Sujatha1 , P. Srivaramangai2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 142-145, Jan-2019

Online published on Jan 31, 2019

Copyright © R. Sujatha, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Sujatha, P. Srivaramangai , “A Survey On Network Layer Attack Detection And Isolation Techniques In MANET,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.142-145, 2019.

MLA Style Citation: R. Sujatha, P. Srivaramangai "A Survey On Network Layer Attack Detection And Isolation Techniques In MANET." International Journal of Computer Sciences and Engineering 07.02 (2019): 142-145.

APA Style Citation: R. Sujatha, P. Srivaramangai , (2019). A Survey On Network Layer Attack Detection And Isolation Techniques In MANET. International Journal of Computer Sciences and Engineering, 07(02), 142-145.

BibTex Style Citation:
@article{Sujatha_2019,
author = { R. Sujatha, P. Srivaramangai },
title = {A Survey On Network Layer Attack Detection And Isolation Techniques In MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {142-145},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=664},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=664
TI - A Survey On Network Layer Attack Detection And Isolation Techniques In MANET
T2 - International Journal of Computer Sciences and Engineering
AU - R. Sujatha, P. Srivaramangai
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 142-145
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

Mobile Ad Hoc Networks is an emerging trend through self configuring independent network environment consists of nodes and links. Due to this spontaneous configuring nature, it is more vulnerable to many attacks. Security is the vital concern in MANET. There are lot of attack strategies are vulnerable in the MANET. In this various attacks, the network layer attacks cause more vigorous. In network layer, the nodes are connected with the nodes in that range and the network formation and data transmission will be done through the multi hop wireless based routing scheme. The detection and mitigation of these attacks makes more complex when it deals with the n number of nodes and links. The detection and mitigation techniques are developed to isolate the attacks and not to make any impact to the legitimate nodes. This paper describes the network layer attacks and its detection and mitigation strategies with their performance. In this paper, the detection strategies are also compared with one another through the results provided from the references.

Key-Words / Index Term

MANET, Attack Detection and Mitigation

References

[1]. Fan-Hsun Tseng1, Li-Der Chou1 and Han-Chieh Chao , “A survey of black hole attacks in wireless mobile ad hoc networks “, Human-centric Computing and Information Sciences 2011.
[2]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges”.
[3]. Rajes Chowdari and Srinivas K, “A Survey on detection of Blackhole and Grayhole Attacks in Mobile Ad-hoc Networks”, International Research Journal of Engineering and Technology, Vol. 04, Issue No.05, May 2017 pp. 1375-1378.
[4]. Jain, S., & Hemrajani, N. 2013, “Detection and mitigation techniques of black hole attack in MANET: An Overview”, International Journal of Science and Research (IJSR), India Online ISSN, 2319-7064.
[5]. Divya R and Maheswari D, “Study of Various Security Attacks and in Network Layer and the Mitigation Techniques for MANET”, International Journal of Advanced Research in Computer and Communication Engineering”, Vol.5, Issue No.2, February 2016, pp.404-410.
[6]. Alsumayt A and Haggerty J, “A Survey of the mitigation methods against DOS attacks on MANETs”, Science and Information Conference, UK, August 2014.
[7]. Mudgal R and Gupta R, “Study of various wormhole attack detection techniques in mobile ad hoc networks”, International Conference on Electrical, Electronics and Optimization Techniques, Published in IEEE, March 2016.
[8]. Rupinder, Jatinder and Ravinder Singh, “WRHT: AHybrid Technique for Detection of wormhole attacks in WSNs”, Research article on Mobile Information Systems, Vol.2016 – 13pps, Nov 2016.
[9]. Wang W, Bhargava B, Linderman M, “Defending against Collaborative Packet Drop Attacks on MANET”.
[10]. Goyal, P., Parmar, V., & Rishi, R., “Manet: vulnerabilities, challenges, attacks, application”, IJCEM International Journal of Computational Engineering & Management, 11(2011), 32-37.
[11]. Kejun Liu, Jing Deng “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs” IEEE transactions on mobile computing, vol. 6, no. 5, may 2007.
[12]. P.Rathiga, Dr. S. Sathappan “Hybrid Detection of Black hole and Gray hole attacks in MANET”, 2016 International Conference on Computational Systems and Information Systems for Sustainable Solutions, 2016.
[13]. Ahmad Salehi, M.A.Razzaque, Parisa Naraei, Ali Farrokhtala, “Detection of Sinkhole Attacks in wireless sensor networks”, IEEE Conf. on Space Science and Communication”, September 2013.
[14]. H.Shafiei, A.Khonsari, and P.Mousavi, “Detection and Mitigation of Sinkhole Attacks in wireless sensor networks”, Journal of Computer and System Sciences, Vol.80, Issue 3, pp.644-653, May 2014.
[15]. R.Sujatha, Dr.P.Srivaramangai,” Enhancing security in Manets Communication Issues and Mechanisms”, International Journal of Computer Techniques – Vol. 4 – Issues 3 (79-83) May – June 2017, ISSN: 2394 – 2231.