Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/6346
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahamed, Uthumansa | - |
dc.contributor.author | Fernando, Shantha | - |
dc.date.accessioned | 2022-12-06T09:10:35Z | - |
dc.date.available | 2022-12-06T09:10:35Z | - |
dc.date.issued | 2022-08-24 | - |
dc.identifier.citation | 2nd International Conference -2022(ICST2022) Proceedings on” Building Sustainable Future Through Technological Transformation “24th August 2022. Faculty of Technology, South Eastern University of Sri Lanka. pp. 84-97. | en_US |
dc.identifier.isbn | 978-624-5736-40-9 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/6346 | - |
dc.description.abstract | Node mobility, infrastructure-less network, open network boundary, and limited resources are general characteristic features of a Mobile Ad-hoc Network (MANET). These characters open MANETs to many security attacks. Network layer-based active attacks such as black-hole and gray-hole attacks are common and destructive. Proposed solutions for these attacks failed to perform well. Some mechanisms that are used in an infrastructure-based network were proposed as lightweight security mechanisms for MANETs. One hundred and two reputed journal and quality conference papers were selected for the review. In this paper, we comprehensively reviewed available security solutions, including lightweight solutions on MANET. The review proved that there is a demand for a lightweight security solution capable of operating with limited resources and mitigating active attacks without a performance drop | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Faculty of Technology, South Eastern University of Sri Lanka, Sri Lanka | en_US |
dc.subject | Active | en_US |
dc.subject | Blackhole | en_US |
dc.subject | Grayhole | en_US |
dc.subject | Lightweight | en_US |
dc.subject | Review | en_US |
dc.subject | Security | en_US |
dc.title | A comprehensive review on lightweight security mechanisms to mitigate network layer-based active attacks | en_US |
dc.type | Article | en_US |
Appears in Collections: | 2nd International Conference on Science and Technology |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.