Mobile ad hoc networks (MANET) has no fixed infrastructure and depends on nodes to perform routing of data packets. MANET nodes are highly self organized even with a collection of few mobile nodes. Security is an important issue for mobile ad hoc networks. Even though mobile ad hoc networks have many advantages over the traditional wired network, when it comes to security it poses an immense set of threats. The scope of this project is to study about Misbehavior Node attack, Byzantine attack and Pulse Jammer attack on Reactive Routing Protocol i.e. Ad Hoc On Demand Distance Vector (AODV) on MANET simulation environment. To perform the simulations we used OPNET modeller 14.5 as the network simulator for our proposed work. The results showed that MANET posed a high security risk attack either from internal or from external attack.
Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.
Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, pp. 70-75, October 2002.
Ekta Nehra and Er. Jasvir Singh, “Performance Comparison of AODV, TODV,OLSR and ABR using OPNET,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, pp. 984-990, May 2013.
Changling Liu and Jörg Kaiser, “A Survey of Mobile Ad Hoc Network Routing Protocols,” The University of Magdeburg, October 2005.
Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, and A. Vishal Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal on Communications, Network and System Sciences, vol. 5, pp. 353-367, June 2012.
Yu Zhang, Loukas Lazos, and William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks,” IEEE Transactions on Mobile Computing, pp. 1-14.
Niroj Kumar Pani, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, National Institute of Technology, May 2009.
A. Rajaram and Dr. S. Palaniswami, “The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks,” International Journal of Computer Science and Engineering, Vol. 2, No. 2, pp 400-408, 2010.
David J. Thuente and Mithun Acharya, “Intelligent Jamming in Wireless Networks with Applications to 802.11b and Other Networks,” North Carolina State University.
Bakiler, H., & Şafak, A. (2015). Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers, 3(2), 127-132. https://doi.org/10.18100/ijamec.61094
AMA
Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. March 2015;3(2):127-132. doi:10.18100/ijamec.61094
Chicago
Bakiler, Hande, and Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3, no. 2 (March 2015): 127-32. https://doi.org/10.18100/ijamec.61094.
EndNote
Bakiler H, Şafak A (March 1, 2015) Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers 3 2 127–132.
IEEE
H. Bakiler and A. Şafak, “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 2, pp. 127–132, 2015, doi: 10.18100/ijamec.61094.
ISNAD
Bakiler, Hande - Şafak, Aysel. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers 3/2 (March 2015), 127-132. https://doi.org/10.18100/ijamec.61094.
JAMA
Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3:127–132.
MLA
Bakiler, Hande and Aysel Şafak. “Analysis of Current Routing Attacks in Mobile Ad Hoc Networks”. International Journal of Applied Mathematics Electronics and Computers, vol. 3, no. 2, 2015, pp. 127-32, doi:10.18100/ijamec.61094.
Vancouver
Bakiler H, Şafak A. Analysis of Current Routing Attacks in Mobile Ad Hoc Networks. International Journal of Applied Mathematics Electronics and Computers. 2015;3(2):127-32.