Complete Scenario of Routing Protocols, Security Leaks and Attacks in MANETs

MANET is a collection of the mobile nodes which form a dynamic and temporary network without the use of centralized network infrastructure. MANETs make use of the routing protocols for controlling the nodes and routing of the packets between the nodes. Due to certain characteristics- dynamic topology, open sharable wireless medium, battery constraints and limited security, the nodes in MANET are susceptible to various attacks. In this paper, the complete aspect of the MANETs- characteristics, fundamental problems, routing protocols, security leaks and attacks in MANET along with the future trends has been discussed in detail.

[1]  Subir Kumar Sarkar,et al.  Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .

[2]  Amit Shrivastava,et al.  Overview of Routing Protocols in MANET ’ s and Enhancements in Reactive Protocols , 2005 .

[3]  M. Rai,et al.  A Novel Review on Routing Protocols in MANETs , 2012 .

[4]  Mohammed Mahmoud,et al.  THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Comparative Analysis of Routing in MANET , 2014 .

[5]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[6]  Abhay Kumar Rai,et al.  Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .

[7]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[8]  Vrinda Tokekar,et al.  Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[9]  G. S. Mamatha,et al.  Network Layer Attacks and Defense Mechanisms in MANETS- A Survey , 2010 .

[10]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[11]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[12]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[13]  Ipsita Panda,et al.  A Survey on Routing Protocols of MANETs by Using QoS Metrics , 2012 .

[14]  Martin Schütte Detecting Selfish and Malicious Nodes in MANETs , 2006 .

[15]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[16]  David Jörg,et al.  Performance Comparison Of MANET Routing Protocols In Different Network Sizes Computer Science Project , 2004 .

[17]  Gaurav Soni,et al.  A Nobel Defence Scheme Against Selfish Node Attack in MANET , 2013, ArXiv.

[18]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[19]  OVERVIEW OF VARIOUS ATTACKS IN MANET AND COUNTERMEASURES FOR ATTACKS , 2013 .

[20]  G. Sahoo,et al.  Mathematical Model for the Detection of Selfish Nodes in MANETs , 2012 .