Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Routing Attacks and Security Measures in MANET


Affiliations
1 Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India
     

   Subscribe/Renew Journal


Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links routinely used to evaluate and manage trust relationships between network nodes and enhance network security. Due to the lack of a central power, securitizing the routing process becomes a difficult task however trust management frameworks themselves are vulnerable to attacks in which results in performance degradation. The study is to present secure of ad hoc networks from various types of routing attacks and improved by various measures to handle different types of malicious behavior that can be enforced to overcome it.


Keywords

Ad Hoc Networks, Trust Routing, Routing Attacks, Network Protocols, Network-Level Security and Protection.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 206

PDF Views: 5




  • A Study on Routing Attacks and Security Measures in MANET

Abstract Views: 206  |  PDF Views: 5

Authors

A. Preethi
Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India
G. Kalpana
Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India

Abstract


Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links routinely used to evaluate and manage trust relationships between network nodes and enhance network security. Due to the lack of a central power, securitizing the routing process becomes a difficult task however trust management frameworks themselves are vulnerable to attacks in which results in performance degradation. The study is to present secure of ad hoc networks from various types of routing attacks and improved by various measures to handle different types of malicious behavior that can be enforced to overcome it.


Keywords


Ad Hoc Networks, Trust Routing, Routing Attacks, Network Protocols, Network-Level Security and Protection.