MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques

Authors

  • Vora K Department of EXTC, Mumbai University, India
  • Shah J Department of EXTC, Mumbai University, India
  • Parmar S Department of EXTC, Mumbai University, India
  • Bhattacharjee S Department of EXTC, Mumbai University, India

Keywords:

MANET, ad hoc security, vulnerabilities, prevention, detection

Abstract

Mobile Ad Hoc Network (MANET), because of its decentralized architecture, dynamic topologies and also due to rapid advancement of wireless devices has become a popular area of research. Though the self-configuring characteristic of Ad Hoc network finds application in various domains, they are exposed to vulnerabilities by malicious attackers which might compromise the entire network and reduce the overall performance of the network. These threats need to be dealt; giving rise to various solutions that would not only maintain the network efficiency but also ensure a successful data transmission along with high level of security. Such solution would require detailed information about the vulnerabilities and different type of attacks which would then lead to computing different detection and prevention mechanisms. This paper gives an overview of vulnerabilities of MANETs, different types of threats and discusses various detection and prevention mechanisms against them.

References

Mohammad Ilyas, “The Handbook of Ad Hoc Wireless Networks” Text Book.

Amitabh Mishra, “Security and Quality of Service in ad hoc wireless networks” (chapter 1, 3), ISBN- 13 978-0-521-87824-1 Handbook

Sukla Banerjee , “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.

Gangotri A Khiratkar and Swati S Mahajan, "Performance Analysis of Cluster Based Routing Protocol for Ad hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (141-143), Apr -2014, E-ISSN: 2347-2693

Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S.Ali, Prof. J.S. Deshpande, “A Survey of Mobile Ad Hoc Network Attacks ”, International Journal of Engineering Science and Technology, Vol. 2(9), 2010, 4063-4071

Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693

Y.C. Hu, A. Perrig, and D.B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proc. 2003 ACM Workshop on Wireless Security (WiSe 2003), ACM Press, 2003, pp. 30–40.

D.Anitha and Dr.M.Punithavalli : A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS. In IJCSMC, Vol. 2, Issue. 3, March 2013.

S.Madhavi and Dr. Tai Hoon Kim: An Intrusion Detection System in Mobile Ad Hoc Networks. In International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.

Ali EI-Mousl and Ashraf Suyyagh: Ad Hoc Networks Security Challenges. In 7th International Multi-Conference on Systems, Signals and Devices, 2010.

Downloads

Published

2025-11-10

How to Cite

[1]
K. Vora, J. Shah, S. Parmar, and S. Bhattacharjee, “MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques”, Int. J. Comp. Sci. Eng., vol. 3, no. 10, pp. 26–31, Nov. 2025.