ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 5)

Publication Date:

Authors : ;

Page : 360-367

Keywords : Mobile Ad hoc Networks; Routing Protocols; Attacks; Flooding; Blackhole;

Source : Downloadexternal Find it from : Google Scholarexternal


Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. These nodes communicate with each other by exchange of packets, which for those nodes not in wireless range goes hop by hop. Unique characteristics, such as dynamic network topology, limited bandwidth, and limited power, nodes running on battery routing in a MANET is a particularly challenging task compared to a conventional network. MANET research has focused on developing an efficient hybrid routing mechanism in such a highly dynamic mobile nodes in network. At present, several efficient routing protocols have been proposed for MANET. However, in the presence of malicious nodes, the networks are vulnerable is possible to various kinds of attacks. In particular, we examine routing attacks, such as link spoofing and colluding miss relay attacks, as well as countermeasures against such attacks in existing MANET protocols.

Last modified: 2013-05-30 20:49:45