TY - JOUR T1 - A Study of Attacks, Attack Detection and Prevention Methods in Proactive and Reactive Routing Protocols AU - Kannan, S. AU - Maragatham, T. AU - Karthik, S. AU - Arunachalam, V.P. JO - International Business Management VL - 5 IS - 3 SP - 178 EP - 183 PY - 2011 DA - 2001/08/19 SN - 1993-5250 DO - ibm.2011.178.183 UR - https://makhillpublications.co/view-article.php?doi=ibm.2011.178.183 KW - MANET security KW -routing protocols KW -data security KW -shared wireless channel KW -routing attacks KW -nodes AB - MANET has no clear line of defense so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power because they introduce heavy traffic load to exchange and verifying keys. In this study, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks such as flooding, black hole, link spoofing attacks and some detection methods like profile-based detection, specification-based detection as well as existing solutions to protect MANET protocols. ER -