Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Routing Protocols and Attacks in Mobile Ad- Hoc Network

S. Sowmiya

Abstract


A Mobile Ad-hoc Network (MANETs) is an autonomous system that enables wireless communication through mobile devices without any centralized control. Compared to wired networks wireless ad-hoc networks are more vulnerable to various attacks due to their infrastructure less access of mobile devices. MANET possess some specific characteristics such as dynamic topology, limited power, limited bandwidth. Many researches have been done for securing MANET by detecting and preventing it from various attacks. Routing protocols are subjected to several kinds to attacks which affects the single user or the whole networks operations. This paper aims to discuss about different kinds of attacks and routing protocols in MANET

Keywords


Attacks, Mobile Ad hoc Network (MANET), Routing Protocols.

Full Text:

PDF

References


Pradip M. Jawandhiya, Mangesh M.Ghonge, Ali. M.S, Prof. Deshpande. J.S, “A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology (2010), Vol. 2(9), pp.4063-4071.

Raja. L, Santhosh Baboo. S, “An Overview of MANET: Applications, Attacks and Challenges”, International Journal of Computer Science and Mobile Computing (IJCSMC) (2014), Vol.3 Issue.1, pp. 408-417.

Akansha Shrivastava and Rajni Dubey, “Wormhole Attack in Mobile Ad-Hoc Network: A Survey”, International Journal of Security and its Applications (2015), Vol.9, No.7, pp.293-298.

Soujanya. B, Sitamahalakshmi. T, Divakar. Ch, “Study of Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Engineering Science and Technology (IJEST) (2011), Vol. 3, No. 4, pp.2622-2631.

Meenakshi Yadav, Nisha Uparosiya, “Survey on MANET: Routing Protocols, Advantages, Problems and Security”, International Journal of Innovative Computer Science & Engineering, Volume 1, Issue 2, pp. 12-17.

Muhammad Kashif Nazir, Rameez U.Rehman, AtifNazir, “A Novel Review on Security and Routing Protocols in MANET”, Communications and Network (2016), vol8, pp.205-218.http://www.scirp.org/journal/cn.

Elizabethm. Royer, Chai-Keong Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications (1999), pp.46-55.

Neetendra Singh Dhakad, Anjana Goen,“Review on Routing Protocols of Mobile Ad-hoc Network MANET”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (2016),Vol. 5, Issue 4,pp.2785-2790.

Martin Mauve, JorgWidmer and Hannes Hartenstein, “A Survey on Position-Based Routing in Mobile Ad Hoc Networks”, IEEE network (2001), pp. 30-39.

Rakhi Kumari Purnima, Behra Rajesh Umashankar, Nishi, “An Overview of Position Based Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Advanced Research in Computer Science & Technology (2014),Vol. 2, Issue 2 ,pp.148-151.

Amandeep Kaur1, Dr.Amardeep Singh, “A Review on Security Attacks in Mobile Ad-hoc Networks”, International Journal of Science and Research (IJSR) (2014), Volume 3 Issue 5, pp.1295-1299.

Mohd Faisal, M.Kumar, Ahsan Ahmed, “ATTACKS IN MANET”, International Journal of Research in Engineering and Technology (2013), Volume 02 , Issue 10 , pp. 273-276.

Mohanapriya Marimuthu, Ilango Krishnamurthi, “Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks”, journal of communications and networks (2013), pp. 31-37.

Chang Wu Yu, Tung-Kuang Wu, ReiHeng Cheng, and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, Springer-Verlag Berlin Heidelberg (2007), pp. 538–549.

Neetu Singh Chouhan, Shweta Yadav, “Flooding Attacks Prevention in MANET” International Journal of Computer Technology and Electronics Engineering (2011), Vol. 1, pp. 68-72.

Nadeem, A., & Howarth, M, “Protection of MANETs from a range of attacks using an intrusion detection and prevention system”, Springer (2013), vol.4, pp.2047–2058.

Su, M. Y., “Prevention of selective Black Hole attacks on MANETs through intrusion detection systems”, Journal of Computer Communication (2010), vol.1, pp. 107–117.

Archana. R, Gracy Theresa, “Survey on Attacks in MANET”, International Journal of Advanced Research in Computer and Communication Engineering (2015), Vol. 4, Issue 9, pp.125-131.

Arun Kumar Yadav, Karan Singh, “Evaluation of Security Threats and Solutions in MANET’S International Journal of Advanced Research in Computer Science and Software Engineering (2016), Volume 6, Issue 2, pp.537-542.

Chavan. A. A., Prof. Kurule. D. S., Prof. P. U. Dere, “Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack”, 7thInternational Conference on Communication, Computing and Virtualization (2016), Procedia Computer Science, pp.835-844.

Aakanksha Kadam, Nirav kumar Patel, Vaishali Gaikwad, “Detection and Prevention of Wormhole attack in MANET”, International Research Journal of Engineering and Technology (IRJET) (2016), Vol 03, Issue: 03, pp.338-393.

Viswa Jhananie K.R, “ An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network”, International Journal of Applied Engineering Research (2016), Volume 11, pp. 3186-3191.

Arvind Dhaka, Amita Nandal and Raghuveer S. Dhaka, “Gray and Black Hole Attack Identification using Control Packets in MANETs”, Eleventh International Multi-Conference on Information Processing (2015), Procedia Computer Science, pp.83-91.

Dharman. V, Venkatachalam. G, “Detection of Gray Hole Attack in AODV for MANETs by using Secure Message Digest”, South Asian Journal of Engineering and Technology (2016), Vol.2, No.17, pp. 321–329.

Muthana Najim Abdulleh, Salman Yussof, Hothefa Shaker Jassim, “Comparative Study of Proactive, Reactive and Geographical MANET Routing Protocols”, Communications and Network (2015), pp.125-137.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.