Corpus ID: 14534598

A Review of Current Routing Attacks in Mobile Ad Hoc Networks

  title={A Review of Current Routing Attacks in Mobile Ad Hoc Networks},
  author={Rasheed Hafeez Khokhar and M. A. Ngadi and Satria Mandala},
  • Rasheed Hafeez Khokhar, M. A. Ngadi, Satria Mandala
  • Published 2008
  • Computer Science
  • A mobile ad-hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various… CONTINUE READING
    135 Citations
    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS
    • 18
    • Highly Influenced
    • PDF
    Detecting blackhole attacks on DSR-based mobile ad hoc networks
    • 35
    MANET Attacks and their Countermeasures: A Survey
    • 5
    Cross Layer Design for Routing and Security Attacks in Multi-Hop Wireless Networks
    • Mr. Shivaji R. Lahane
    • 2017
    • 3
    A Surveys of Attacks in MANET
    • 24
    A Survey of Flooding Attack and Its Countermeasures on MANET
    • 2014
    • Highly Influenced
    Analysis of attacks on routing protocols in MANETs
    • Raj Kamal Kapur, S. Khatri
    • Computer Science
    • 2015 International Conference on Advances in Computer Engineering and Applications
    • 2015
    • 11


    A survey of routing attacks in mobile ad hoc networks
    • 564
    A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks
    • 50
    • Highly Influential
    Wormhole attacks in wireless networks
    • 744
    • Highly Influential
    • PDF
    A New Routing Attack in Mobile Ad Hoc Networks
    • 94
    • PDF
    Securing ad hoc routing protocols
    • 369
    • PDF
    A secure routing protocol for ad hoc networks
    • 1,819
    • PDF
    Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path
    • 111
    • PDF
    Black hole attack in mobile Ad Hoc networks
    • 514
    • PDF
    Securing OLSR Using Node Locations
    • 37