User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 26
MANET Routing Attacks and Their Countermeasures: A Survey
2021
Journal:  
Turkish Online Journal of Qualitative Inquiry
Author:  
Abstract:

Mobile Ad-hoc Network (MANET) is sometimes described as an autonomous system designed through the coordination of a collection of mobile nodes that communicate with each other via wireless connections. Nodes in the network behave as end-systems as well as packet forwarding routers. Every node can move freely, change locations and configure itself to form a network. MANET poses challenges such as open peer-to-peer network infrastructure, shared wireless media, severe resource constraints and highly dynamic topology of network. Special / proper routing protocols are required to cope with the challenges. Choosing the algorithms had to understand the characteristics of the network, such as node density, size and mobility. The primary concern of routing protocols in MANET is to; establish an optimal and efficient route between the communicating parties. Any routing phase attack can disrupt communication and paralyze the entire network. Providing security for a protected communication between nodes in routing has thus become a prime concern. MANET's dependability and security aspects, such as jamming and eavesdropping, should be taken care for the users to perform secured peer-to - peer communication over a wireless multi-hop channel. A user must be provided with security services such as authentication, integrity, non-repudiation, confidentiality, key and trust management and access control, depending on the context of the application. In this paper we have tried to present the entire thing; starting from the basic concept of MANET, its architecture, routing protocols, attacks during routing, security attributes and the proposed countermeasures at a single place. This paper will facilitate the researchers to understand the security challenges in MANET and motivate them to design a multi-fence security solution to achieve both bound protection and desirable network performance, considering all three security components detection, reaction and prevention.

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Online Journal of Qualitative Inquiry

Field :   Eğitim Bilimleri

Journal Type :   Uluslararası

Metrics
Article : 4.283
Cite : 1.090
2023 Impact : 0.002
Turkish Online Journal of Qualitative Inquiry