000 -LEADER |
fixed length control field |
a |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220914093017.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220914b xxu||||| |||| 00| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AIKTC-KRRC |
Transcribing agency |
AIKTC-KRRC |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
17904 |
Author |
Mahamune, Ankita A. |
245 ## - TITLE STATEMENT |
Title |
TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile ad Hoc networks |
250 ## - EDITION STATEMENT |
Volume, Issue number |
Vol.103(1), Feb |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York |
Name of publisher, distributor, etc. |
Springer |
Year |
2022 |
300 ## - PHYSICAL DESCRIPTION |
Pagination |
273-291p. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having mobile nodes dynamically building up routes among themselves for transmission of packets. Security is the most crucial interest for its essential working. Due to its distinctive features including active network topology, lack of fixed/centralized authority, slower data transfer rate, a limited number of resources, bandwidth, and battery power, it is often attackable by malevolent nodes. Various types of attacks can affect network operations and make trans-reception untrustworthy. In order to obtain a more robust MANET operation through innovative design and development strategies, the study of severity of various attacks and their respective counter measures is necessary. This paper presents a detailed survey of TCP/IP layerwise attacks on MANET and the corresponding defence mechanisms. Further, a MANET scenario using a standard dynamic routing protocol Ad Hoc On-demand Distance Vector (AODV) is framed and tested under the routing disruption attacks viz. grayhole, blackhole, and cooperative blackhole. The attacks are simulated in the EXata environment to determine their prevalence over others in varying network scenarios. The comparative performance analysis is also carried out based on the measurements of the state-of-the-art evaluation metrics like Packet Delivery Ratio (PDR), end-to-end delay, throughput, jitter, and the number of data packets dropped by malicious nodes. The presented work brings uniqueness where it covers a wide variety of attacks, respective defence mechanisms, and a successful practical demonstration to validate the severity of selective dominant attacks all at one place which is not found in earlier literature. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
4642 |
Topical term or geographic name entry element |
Humanities and Applied Sciences |
700 ## - ADDED ENTRY--PERSONAL NAME |
9 (RLIN) |
17905 |
Co-Author |
Chandane, M. M. |
773 0# - HOST ITEM ENTRY |
International Standard Serial Number |
2250-2106 |
Title |
Journal of the institution of engineers (India): Series B |
856 ## - ELECTRONIC LOCATION AND ACCESS |
URL |
https://link.springer.com/article/10.1007/s40031-021-00627-0 |
Link text |
Click here |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Articles Abstract Database |