Visible to the public Attacks and mitigation techniques on mobile ad hoc network \#x2014; A survey

TitleAttacks and mitigation techniques on mobile ad hoc network \#x2014; A survey
Publication TypeConference Paper
Year of Publication2017
AuthorsChowdhury, S. K., Sen, M.
Conference Name2017 International Conference on Trends in Electronics and Informatics (ICEI)
Date Publishedmay
Keywordsattack mitigation, attacks in manet, attacks techniques, civilian environment, compositionality, MANET, Market research, Metrics, military rescue operations, military search operations, mitigation techniques, mobile ad hoc network, mobile ad hoc networking, mobile ad hoc networks, Peer-to-peer computing, pubcrawl, resilience, Resiliency, Routing, Routing protocols, routing table, Sybil attack, telecommunication network routing, ubiquitous computing
Abstract

A mobile ad hoc network is a type of ad hoc network in which node changes it locations and configures them. It uses wireless medium to communicate with other networks. It also does not possess centralized authority and each node has the ability to perform some tasks. Nodes in this type of network has a routing table depending on which it finds the optimal way to send packets in forward direction but link failure should be updated in node table to encompass that. In civilian environment like meeting rooms, cab networking etc, in military search and rescue operations it has huge application.

URLhttps://ieeexplore.ieee.org/document/8300907/
DOI10.1109/ICOEI.2017.8300907
Citation Keychowdhury_attacks_2017