Abstract
Mobile Ad hoc Networks (MANET) due to its unpredictable topology and bandwidth limitations are vulnera ble to attacks. Establishing security measures and find ing secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node a uthentication, insider attack and intrusion detecti on. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitig ate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modificati on of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection . This study studied various approaches to predict and mit igate attacks in MANET.
Highlights
Mobile Ad Hoc Network (MANET) depends upon all the available nodes for routing of data packets, service discovery in the network due to the limited range of transmission
Mobile Ad hoc Networks (MANET) due to its unpredictable topology and bandwidth limitations are vulnerable to attacks
This study studied various approaches to predict and mitigate attacks in MANET
Summary
Mobile Ad Hoc Network (MANET) depends upon all the available nodes for routing of data packets, service discovery in the network due to the limited range of transmission. The source on receiving several routes picks up the shortest route and sends along the data packet along that path Route metrics such as the number of hops, delay, bandwidth and the time taken for the Reply to reach the source are all taken into consideration by the source node while selecting route and storing it in its cache. The source node removes the route containing the broken link from its cache and uses another route for the destination or starts a route discovery process. Corresponding Author: Manikandan, S.P., Department of Computer Science and Engineering, Faculty of Engineering, Anna University of Technology, Coimbatore, India. AODV uses hello messages and sequence number as in DSDV and the route discovery process is similar to DSR. Explore several DSR and AODV routing protocol implementation with regard to intrusion detection and mitigating attacks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.