Investigative Analysis of Repudiation Attack on MANET With Different Routing Protocols

In this paper, the authors present an investigative analysis of Repudiation attack that arrives at the application layer in mobile ad-hoc network. Most of the research work in MANET is focused on network layer attack analysis because most attacks can be identified and its effect can be neutralized on network layer itself. But some attacks bypasses the network layer and reaches to affect the application layer. In this paper, they also implemented different routing protocols for the analysis and compare them using performance parameters like throughput, delay & load. In order to suggest the most efficient routing protocol under the influence of repudiation attack, they use this comparative study.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Topic:
Security
Format:
PDF