International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 6, June 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616


[Full Text]



Ms V. Divya, Dr. R. Gobinath



Pro-active protocol, Re-active protocol, Hybrid protocol, Blackhole and Worm hole attacks, cryptography.



In wireless network MANET uses mobile nodes for transmitting data with external transmission range. Network results in multiple authentication problems that reduce the development of the network. In this paper the issues and attacks in mobile ad hoc network were fully categorized and analysed. External and Internal attacks are also analysed. Along with the security, the advanced routing techniques are also concentrated. This paper mainly focuses on security problems and the packet routing solutions in wireless MANET.



[1] Iqbal, Muddesar & Shafiq, Muhammad & Choi, Jin-Ghoo & Attaullah, Hasina & Akram, Khawar & Wang, Xingheng. (2014). Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol. International Journal of Adaptive, Resilient and Autonomic Systems. 5. 20-39. 10.4018/ijaras.2014070102.
[2] Study of Security Attacks In MANET 11BCE111 KUNAL PRAJAPATI.
[3] The Internet-of-Things (IoT) Security : A Technological Perspective and Review, Dr. Yusuf Perwej et al Int J Sci Res CSE & IT. January-February-2019; 5(1): 462-482.
[4] Route maintenance in www.rroij.com
[5] Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu, “Risk-Aware Mitigation for MANET Routing Attacks”, IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2, pp. 250-260, 2012.
[6] Priyanka Goyal, Viniti Parmar and Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, International Journal of Computational Engineering & Management, Vol. 11, pp. 32-37, 2011.
[7] Neetu Singh Chouhan and Shweta Yadav “Flooding Attacks Prevention in MANET”, International Journal of Computer Technology and Electronics Engineering, Vol. 1, No. 3, pp. 68-72, 2011.
[8] Gagandeep, Aashima and Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology, Vol. 1, No. 5, pp. 269-275, 2012.
[9] Amrit Suman, Praneet Saurabh and Bhupendra Verma, “A B.ehavioral Study of Wormhole Attack in Routing for MANET”, International Journal of Computer Applications, Vol. 26, No. 10, pp. 42-46, 2011.
[10] Ammar Odeh, Eman AbdelFattah and Muneer Alshowkan, “Performance evaluation of AODV and DSR routing protocols in MANET Networks”, International Journal of Distributed and Parallel Systems, Vol. 3, No. 4, pp. 13-22, 2012.
[11] Punardeep Singh, Harpal Kaur and Satinder Pal Ahuja, “Brief Description of Routing Protocols in MANETS And Performance And Analysis (AODV, AOMDV, TORA)”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 1, 2012.
[12] Anju Gill and Chander Diwaker, “Comparative Analysis of Routing in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 7, 2012.
[13] Rajiv Chechi, Vikas Malik and Ompal Gupta, “Classification of Routing Protocols in MANET & their Pros & Cons: A Review”, International Journal of Research in IT & Management, Vol. 2, No. 11, pp. 28-31, 2012.
[14] Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, “Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET”, International Journal of Computer Science, Engineering and Applications, Vol. 2, No. 1, 2012.