Main Article Content
Ad hoc networks are useful when there is no infrastructure set up possible. Mobile ad hoc network provides anytime, anywhere communication. These types of networks are vulnerable to attacks. For MANET, the topology is dynamic, bandwidth is limited, power is limited and medium is open. Any unauthorized node can easily enter into the communication medium. So providing security is very hard. Various attacks possible on mobile adhoc networks includes wormhole, blackhole, jamming, grayhole, Sybil etc. Jamming attack is a form of denial of service attack in which a malicious node frequently sends route request packet and so creates traffic in the network. It jams the network. We have presented various existing methods to detect such type of attack.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko2, “A Specification-based Intrusion Detection System for AODV, Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia © 2003
M. Rmayti, Y. Begriche, R.Khatoun, L. Khoukhi, D. Gaiti, “Flooding Attacks Detection in MANETs” IEEE International Conference on Cyber Security of Smart cities, Industrial Control System and Communications, 2015.
Nisha Soms, R.Sajipriya, A. Sukkiriya Banu, “A Comprehensive Performance Analysis of Zone Based Intrusion Detection System in Mobile Ad hoc Networks” 3rd International Conference on Signal Processing, Communication and Networking, 2015.
Rajnish Choubey, Sandeep Sahu, “Flooding Attack Prevention Algorithm in AODV Protocol for Mobile Ad-hoc Network,” International Journal of Science and Advanced Technology (ISSN 2221-8386) Volume 1 No 6 August 2011
S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin, “Resisting Flooding Attacks in Ad Hoc Networks”, International Conference on Information Technology: Coding and Computing (ITCC’05)
Ms. Neetu Singh Chouhan, Ms. Shweta Yadav, “Flooding Attacks Prevention in MANET” International Journal of Computer Technology and Electronics Engineering (IJCTEE), Volume 1, Issue 3, 2013 .
Prajeet Sharma, Niresh Sharma, Rajdeep Singh, “A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network” International Journal of Computer Applications (0975 – 8887) Volume 41– No.21, March 2012