A Survey on computation of neighbouring nodes and malicious nodes in all direction with single directional antenna

This paper presents various issues caused by the attack of malicious node. In this paper we compare different techniques which is used for the computation of neighboring nodes and malicious nodes using directional antenna. Since directional antenna has so many advantages compared to other traditional antenna this topic has great relevant. The different techiques are obtained from the literature survey done on the earliest papers. The mainly two type of attacks are introduced in this survey paper are black hole attack and worm hole attack.

[1]  Robert E. Hiromoto,et al.  A MAC protocol for mobile ad hoc networks using directional antennas , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[2]  Ketan S. Chavda,et al.  Removal of black hole attack in AODV routing protocol of MANET , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[3]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[4]  Leonard Kleinrock,et al.  Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..

[5]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[6]  Swaijit Kaushal,et al.  A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack , 2015 .

[7]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Nitin H. Vaidya,et al.  Using directional antennas for medium access control in ad hoc networks , 2002, MobiCom '02.

[9]  Jianping Pan,et al.  A Distributed Directional-to-Directional MAC Protocol for Asynchronous Ad Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[11]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[12]  Ram Ramanathan,et al.  Ad hoc networking with directional antennas: a complete system solution , 2005, IEEE J. Sel. Areas Commun..

[13]  Umang Singh,et al.  Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption , 2010, IET Commun..

[14]  Donald F. Towsley,et al.  Neighbor discovery in wireless networks and the coupon collector's problem , 2009, MobiCom '09.