A Review on the Detection & Prevention of the Sleep Deprivation Attack in MANET

Mobile networks are ever expanding and have come to take up the center stage in communication industry. Basically a MANET is used to communicate using wireless links with mobile devices forming a temporary network. This kind of network changes dynamically and contains a self-organized infrastructure-less topology. The motive to look for the security in Mobile Ad Hoc NETworks (MANETs) is that it is unsecured as it has no permanent infrastructure that depends on participating nodes. The inherent features of MANETs make them vulnerable to several routing and other layer attacks and it may be impossible to take any counter action once the attacks have been launched.

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Subscribe to the Innovation Insider Newsletter

Catch up on the latest tech innovations that are changing the world, including IoT, 5G, the latest about phones, security, smart cities, AI, robotics, and more. Delivered Tuesdays and Fridays

Resource Details

Provided by:
Science Publications
Topic:
Mobility
Format:
PDF