{"title":"A survey on attacks in Ad hoc on Demand Distance Vector protocol","authors":"Mbrindha Devi, T. Kalaikumaran, S. K. Thik","doi":"10.1109/ISCO.2017.7856041","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of many mobile nodes. The topology may get changed due to higher mobility. The security is another aspect which is very low. Routing protocols are used for transferring the data packets. Due to high vulnerability in security, many attacks such as black hole attacks may occur at the time of routing in routing protocols. AODV is one of the routing protocols which is also affected by such attacks. In this paper several existing methods available to mitigate the attacks in AODV protocol are analyzed.","PeriodicalId":321113,"journal":{"name":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 11th International Conference on Intelligent Systems and Control (ISCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCO.2017.7856041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Mobile Ad hoc Network (MANET) consists of several nodes which are configurable. It consists of multiple number of wireless nodes. The nodes are mobile nodes. It consists of many mobile nodes. The topology may get changed due to higher mobility. The security is another aspect which is very low. Routing protocols are used for transferring the data packets. Due to high vulnerability in security, many attacks such as black hole attacks may occur at the time of routing in routing protocols. AODV is one of the routing protocols which is also affected by such attacks. In this paper several existing methods available to mitigate the attacks in AODV protocol are analyzed.