TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile ad Hoc networks (Record no. 17527)

000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220914093017.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220914b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 17904
Author Mahamune, Ankita A.
245 ## - TITLE STATEMENT
Title TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile ad Hoc networks
250 ## - EDITION STATEMENT
Volume, Issue number Vol.103(1), Feb
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. Springer
Year 2022
300 ## - PHYSICAL DESCRIPTION
Pagination 273-291p.
520 ## - SUMMARY, ETC.
Summary, etc. Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having mobile nodes dynamically building up routes among themselves for transmission of packets. Security is the most crucial interest for its essential working. Due to its distinctive features including active network topology, lack of fixed/centralized authority, slower data transfer rate, a limited number of resources, bandwidth, and battery power, it is often attackable by malevolent nodes. Various types of attacks can affect network operations and make trans-reception untrustworthy. In order to obtain a more robust MANET operation through innovative design and development strategies, the study of severity of various attacks and their respective counter measures is necessary. This paper presents a detailed survey of TCP/IP layerwise attacks on MANET and the corresponding defence mechanisms. Further, a MANET scenario using a standard dynamic routing protocol Ad Hoc On-demand Distance Vector (AODV) is framed and tested under the routing disruption attacks viz. grayhole, blackhole, and cooperative blackhole. The attacks are simulated in the EXata environment to determine their prevalence over others in varying network scenarios. The comparative performance analysis is also carried out based on the measurements of the state-of-the-art evaluation metrics like Packet Delivery Ratio (PDR), end-to-end delay, throughput, jitter, and the number of data packets dropped by malicious nodes. The presented work brings uniqueness where it covers a wide variety of attacks, respective defence mechanisms, and a successful practical demonstration to validate the severity of selective dominant attacks all at one place which is not found in earlier literature.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4642
Topical term or geographic name entry element Humanities and Applied Sciences
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 17905
Co-Author Chandane, M. M.
773 0# - HOST ITEM ENTRY
International Standard Serial Number 2250-2106
Title Journal of the institution of engineers (India): Series B
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://link.springer.com/article/10.1007/s40031-021-00627-0
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Barcode Date last seen Price effective from Koha item type
          School of Engineering & Technology School of Engineering & Technology Archieval Section 2022-09-14 2022-1595 2022-09-14 2022-09-14 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha