Security attacks and detection schemes in MANET
Citations
116 citations
75 citations
31 citations
21 citations
Cites methods from "Security attacks and detection sche..."
...In this study, we focus on different types of attacks and classify them into the three following categories: First, various attempts have been made by various researchers[5], [6], [7], [8], [9], [10], [11], [12], [1], [4], [13], [14] to classify the attacks on the OSI model....
[...]
15 citations
References
[...]
4,816 citations
"Security attacks and detection sche..." refers methods in this paper
...Trusted certification: In this detection mechanism [25], Centralized authority is set up for providing single identities for the nodes....
[...]
1,746 citations
970 citations
"Security attacks and detection sche..." refers background in this paper
...These factors have changed the battle field situation for the MANET against the security threads [19]....
[...]
...state-of-the-art security proposals that protect the MANET link- and network layer operations of delivering packets over the multihop wireless channel [19]....
[...]
...Availability of network services, confidentiality and integrity of the data can be achieved by assuring that security issues have been met [19]....
[...]
936 citations
"Security attacks and detection sche..." refers background in this paper
...Hence it has extensive applications, such as disaster recovery, rescue mission, tactical battlefield, mining operations, maritime communications, vehicle network, casual meeting, campus network and so on [18][15]....
[...]
...Since neither the pure proactive nor the reactive approach is sufficient, hybrid protocols make use of both reactive and proactive approaches by adapting the protocols to the specific conditions and is in general the optimal choice [15]....
[...]
...On the contrary, reactive protocols, also known as source-initiated on-demand driven protocols, do not periodically update the routing information and routes are created only when desired by source node [15]....
[...]
727 citations
"Security attacks and detection sche..." refers background in this paper
...This attack makes route discovery process difficult [27]....
[...]
...Whenever Attacker receives a route request packet from the source node, it floods the packet quickly throughout the network before other nodes, which also receive the same route request packet can react [27]....
[...]