Routing in MANET and the Various Threats: A Survey
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Wireless network is a network established using radio signal frequency to communicate among computers and other network devices. One such network is MANET which is a self configuring infrastructure-less network of mobile devices connected wirelessly. Wireless adhoc network like MANET consists of a number of mobile nodes that communicate with each other without the help of any fixed infrastructure or centralized network. Each device is free to join or leave the network whenever required. Therefore in this case; security is a big issue as the chances of attacks are severe. Various routing protocols used to set up a wireless connection are Reactive protocols like DSR; AODV; TORA and then the proactive protocols like DSDV; OLSR. Also there are the hybrid protocols that include ZRP. Any of these can be used for routing as per the requirement of the network. The various attacks are possible when it comes to a network like MANET. These may be Black hole attack; Grayhole attack; wormhole attack; Selective packet drop. Selective packet dropping attack is very complex and difficult to isolate. We discuss various algorithms and methods to identify selective packet drop in MANET and isolate it as much possible. We also compare methods for further improvement in the same.

Keywords: MANET, Adhoc network, Selective packet drop, AODV

Edition: Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Share this Article

How to Cite this Article?

Anita, Er. Abhilasha, "Routing in MANET and the Various Threats: A Survey", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02014775, Volume 3 Issue 6, June 2014, 2409 - 2411

101 PDF Views | 86 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Adhoc network'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1594 - 1600

Hybrid Solution for Hidden Terminal Problem on VANETS

Sukhjinder Singh, Amandeep Kaur Virk

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur, Pooja Saini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

Similar Articles with Keyword 'Selective packet drop'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1191 - 1196

Lightweight Key Distribution for Secure Routing and Secure Information Propagation

Anubha Goyal, Geetanjali Babbar

Share this Article

Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2550 - 2556

Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme

Anil Rathod, Sherly Noel

Share this Article
Top