Article Details

Secure Routing Techniques In Mobile Ad Hoc Network |

Gundeep Tanwar, in Journal of Advances in Science and Technology | Science & Technology


There are numerous kinds of attacks against the routinglayer in the mobile ad hoc networks, some of which are more sophisticated andharder to detect than others, such as Wormhole attacks and Rush attacks. Inthis part, we first discuss these two kinds of sophisticated attacks and thenwe introduce Watchdog and Pethrater which are two main components in a systemthat aims to mitigate the routing misbehaviors in mobile ad hoc networks.Finally we move to a secure ad hoc routing approach using localizedself-healing communities.