Literature review of routing attacks in MANET

Mobile Ad-hoc Network (MANET) is based on the routing algorithm which adapts the random changes that may occur in the network topology. MANET is the network with the number of mobile nodes that communicates with one another without any centralized infrastructure. A MANET has a self-organizing property due to which every mobile node gets in connect with each other by wireless links, which follows a random topology. Due to this the wireless ad-hoc network is not secure from the attacks of the malicious nodes. This paper presents the literature review of the routing protocols like AODV, DSR and etc. The paper also presents different layers attacks behavior and countermeasures against those attacks like Blackhole attack, Wormhole attack, Greyhole attack and etc.

[1]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[2]  S C Sharma,et al.  Analytical Study of Broadcast in Mobile Adhoc Network , 2011 .

[3]  Pascal Lorenz,et al.  Performance analysis of optimized trust AODV using ant algorithm , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  B EndSemesterMcs WIRELESS AND MOBILE NETWORKS , 2011 .

[5]  A. Khatkar,et al.  Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[6]  Badr Benmammar,et al.  Wireless and Mobile Networks , 2013 .

[7]  Subrat Kar,et al.  BAAP: Blackhole attack avoidance protocol for wireless network , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[8]  Vimal Kumar,et al.  An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .

[9]  Savita Gandhi,et al.  Effect of pause time on AODV and TSDRP routing protocols under black hole attack and DoS attacks in MANETs , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[10]  Mamta patel,et al.  Sinkhole Attack Detection Based on Redundancy Mechanism in Wireless Sensor Network , 2016 .

[11]  Lidong Zhai,et al.  Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks , 2014, ITQM.

[12]  I. Woungang,et al.  Detecting blackhole attacks on DSR-based mobile ad hoc networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[13]  S. C. Sharma Routing Load Analysis of Broadcast based Reactive Routing Protocols AODV, DSR and DYMO for MANET , 2011 .

[14]  Abdul Hanan Abdullah,et al.  A review of blackhole attack in mobile adhoc network , 2013, 2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME).

[15]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[16]  Chaitali Biswas Dutta,et al.  A novel blackhole attack for multipath AODV and its mitigation , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[17]  Peter J. B. King,et al.  Analysis of security attacks on AODV routing , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[18]  R. H. Jhaveri,et al.  MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[19]  Farrukh Aslam Khan,et al.  Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.

[20]  Manoj Duhan,et al.  An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.

[21]  Vandana Dubey,et al.  Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[22]  Santosh S. Sambare,et al.  Detecting and Overcoming Blackhole Attack in AODV Protocol , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.

[23]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[24]  Sisily Sibichen,et al.  An efficient AODV protocol and encryption mechanism for security issues in adhoc networks , 2013, 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.