Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Routing in MANET and the Various Threats: A Survey
Anita, Er. Abhilasha
Wireless network is a network established using radio signal frequency to communicate among computers and other network devices. One such network is MANET which is a self configuring infrastructure-less network of mobile devices connected wirelessly. Wireless adhoc network like MANET consists of a number of mobile nodes that communicate with each other without the help of any fixed infrastructure or centralized network. Each device is free to join or leave the network whenever required. Therefore in this case; security is a big issue as the chances of attacks are severe. Various routing protocols used to set up a wireless connection are Reactive protocols like DSR; AODV; TORA and then the proactive protocols like DSDV; OLSR. Also there are the hybrid protocols that include ZRP. Any of these can be used for routing as per the requirement of the network. The various attacks are possible when it comes to a network like MANET. These may be Black hole attack; Grayhole attack; wormhole attack; Selective packet drop. Selective packet dropping attack is very complex and difficult to isolate. We discuss various algorithms and methods to identify selective packet drop in MANET and isolate it as much possible. We also compare methods for further improvement in the same.
Keywords: MANET, Adhoc network, Selective packet drop, AODV
Edition: Volume 3 Issue 6, June 2014
Pages: 2409 - 2411
How to Cite this Article?
Anita, Er. Abhilasha, "Routing in MANET and the Various Threats: A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02014775, Volume 3 Issue 6, June 2014, 2409 - 2411
101 PDF Views | 86 PDF Downloads
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'Adhoc network'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1594 - 1600Hybrid Solution for Hidden Terminal Problem on VANETS
Sukhjinder Singh, Amandeep Kaur Virk
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1353 - 1357Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
Manpreet Kaur, Pooja Saini
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash
Similar Articles with Keyword 'Selective packet drop'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2409 - 2411Routing in MANET and the Various Threats: A Survey
Anita, Er. Abhilasha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1191 - 1196Lightweight Key Distribution for Secure Routing and Secure Information Propagation
Anubha Goyal, Geetanjali Babbar
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 633 - 636Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay
Kaushal Kishor, Parma Nand
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2550 - 2556Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme
Anil Rathod, Sherly Noel