Open Access Open Access  Restricted Access Subscription Access

Review on Security Threats in MANET

Himangri singhal

Abstract


MANETs include wireless nodes that keep up a correspondence with each other inside the nonappearance of a consistent base. Examples incorporate battlefield situations, disaster relief and short term situations equivalent to public events. In MANETs, routing methods solve the direct communication between starting place and destination. This paper presents trust based MANET. In this paper, various attacks on MANET are discussed and analyzed along with the literature survey.

Cite this Article
Himangri Singhal, Hitesh Madan. Review on Security Threats in MANET. Journal of Advances in Shell Programming. 2016; 3(2): 8–18p.


Keywords


Security threats, shell programming, shell scripts, programming in MANETS

Full Text:

PDF

References


Neeraj Arya, Upendra Singh, Sushma Singh. Detecting and Avoiding of Worm Hole Attack and Collaborative Blackhole Attack on MANET using Trusted AODV Routing Algorithm. IEEE International Conference on Computer, Communication and Control (IC4-2015).

Vijaya Singh, Megha Jain. A Survey of Trust Based AODV Routing Protocols in MANETS. International Journal of Scientific & Engineering Research (IJSER). Dec 2014; 5(12): 716–720p.

Praveen Kumar B, Chandra Sekhar P, Papanna N, et al. A Survey on MANET Security Challenges and Routing Protocols. Int J Computer Technology & Applications (IJCTA). 4(2): 248–256p.

Godwin Ponsam J, Srinivasan R. A Survey on MANET Security Challenges, Attacks and its Countermeasures. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Jan–Feb 2014; 3(1): 274–279p.

Sachin Gour, Sumit Sharma. A Survey of Security Challenges and Issues in Manet. Computer Engineering and Intelligent Systems. 2015; 6(12): 21–28p.

Supriya Tayal, Vinti Gupta. A Survey of Attacks on Manet Routing Protocols. Int J Innov Res Sci Eng Technol. Jun 2013; 2(6): 2280–2285p.

Menaka R, Ranganathan V. A Survey of Trust related Routing Protocols for Mobile Ad Hoc Networks. International Journal of Emerging Technology and Advanced Engineering (IJETAE). Apr 2013; 3(4): 903–910p.

Geetha S, Geetha Ramani G. Survey of Trust Based Routing Protocols in MANET. Int J Adv Res Comput Sci Softw Eng. Oct 2014; 4(10): 604–608p.

Nathan Griffiths, Arshad Jhumka, Anthony Dawson, et al. A Simple Trust model for On-Demand Routing in Mobile Ad-hoc Networks.

Fidel Thachil, Shet KC. A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET. 2012 International Conference on Computing Sciences. 281–285p.

Dhurandher Sanjay K, Isaac Woungang, Raveena Mathur, et al. GAODV: A Modified AODV against Single and Collaborative Black Hole Attacks in MANETs. 27th International Conference on Advanced Information Networking and Applications Workshops. 2013; 375–362p.

Marchang N, Datta R. Light-Weight Trust-Based Routing Protocol for Mobile Ad Hoc Networks. The Institution of Engineering and Technology; 2012; 77–83p.

Thanigaivel G, Ashwin Kumar N, Yogesh P. TRUNCMAN: Trust based Routing Mechanism using Non-Corporative Moment in the Ad-Hoc Network. Sriperumbudur, Tamil Nadu, India: Sri Venkateswara College of Engineering; 261–266p.

Meenakshi Dubey, Patheja PS, Vijay Lokhande. Reputation based Trust Allocation and Fault Node Identification with Data Recovery in MANET. IEEE International Conference on Computer, Communication and Control (IC4-2015). 1–6p.

Radha Krishna Bar, Jyotsna Kumar Mandal, Moirangthem Marjit Singh. QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack. International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA). 2013; 530–537p.

Ahmed Malik N, Abdul Hanan Abdullah, Hassan Chizari, et al. F3TM: Flooding Factor based Trust Management Framework for Secure Data Transmission in MANETs. Journal of King Saud University-Computer and Information Sciences. 1–12p.

Jin-Hee Cho, Ing-Ray Chen. On the Tradeoff between Altruism and Selfishness in MANET Trust Management. Cho J-H, Chen I-R. Ad Hoc Networks. 2013; xxx: 1–18p.

Komathy K, Narayanasamy P. Trust-

Based Evolutionary Game Model Assisting AODV Routing against Selfishness. J Netw Comput Appl. 2008; 31: 446–471p.

Wang Boa, Huang Chuanhea, Li Layuanb, et al. Trust-Based Minimum Cost Opportunistic Routing for Ad Hoc Networks. J Syst Software. 2107–2122p.

Hui Xia, Jia Yu, Cheng-liang Tian, et al. Light-Weight Trust-Enhanced On-Demand Multi-Path Routing in Mobile Ad Hoc Networks. J Netw Comput Appl. 1–21p.

Shuaishuai Tan, Xiaoping Li, Qingkuan Dong. Trust Based Routing Mechanism for Securing OSLR-Based 4 MANET. Xi’an 710071, China: State Key Laboratory of Integrated Services Networks, Xidian University; 1–15p.

Bo Wang, Xunxun Chen, Weiling Chang. A Light-Weight Trust-Based QoS Routing Algorithm for Ad Hoc Networks. Pervasive Mob Comput. 1–26p.

Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay. A Novel Encounter Based Trust Evaluation for AODV Routing in MANET. Applications and Innovations in Mobile Computing (AIMoC). 2015; 141–145p.

Mousumi Sardar, Koushik Majumder. A Comparative Study on Different Trust Based Routing Schemes in MANET. International Journal of Wireless & Mobile Networks (IJWMN). Oct 2013; 5(5): 145–164p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/