Detection of Abnormalities in MANETs

@inproceedings{Wang2007DetectionOA,
  title={Detection of Abnormalities in MANETs},
  author={Wenye Wang},
  year={2007}
}
For both directions, security analysis has been addressed along with peer-to-peer networking architecture for MANETs and sensor networks. In short, there are 10 attacks addressed by most of these works, except each work discusses one or more specific attacks that are not covered by others: spoofing of IP address, forging of route request, forging of route reply, injecting route reply without receiving a route request, replay attack, rushing attacks, generating false errors, jamming, man-in-the… CONTINUE READING