Comprehensive review of collaborative network attacks in MANET

Oluwafemi Tolulope Fasunlade*, Shikun Zhou, David Sanders

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

206 Downloads (Pure)


This paper considers multiple network attacks in a Mobile Ad hoc Network (MANET). MANET is a type of network that does not require any infrastructure for nodes to communicate with each other. The general assumption in MANET is that each node is a trusted node. However, due to its lack of infrastructure and dynamic topology, the MANET is exposed to network layer attacks. In this paper, some of the network layer attacks such as the black hole attack, worm hole attack and gray hole attack are discussed. Frequent multiple network attacks are highlighted, and the identification of collaborative network attacks is discussed. There are several symptoms and observations in a network that signal the presence of an attack and some of the symptoms of these attacks will be highlighted. Finally, an analysis of existing multiple network attacks will be discussed, and the identification of prospective multiple network attacks is considered.
Original languageEnglish
Title of host publicationProceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
EditorsW. K. Chan, Bill Claycomb, Hiroki Takakura, Ji-Jiang Yang, Yuuichi Teranishi
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages4
ISBN (Electronic)978-1-7281-7303-0
ISBN (Print)978-1-7281-7304-7
Publication statusPublished - 22 Sept 2020
Event2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) - Madrid, Spain
Duration: 13 Jul 202017 Jul 2020

Publication series

NameIEEE COMPSAC Proceedings Series
ISSN (Print)0730-3157


Conference2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)


  • Computers
  • Software
  • AODV
  • blackhole
  • wormhole
  • gray hole


Dive into the research topics of 'Comprehensive review of collaborative network attacks in MANET'. Together they form a unique fingerprint.

Cite this