A Study on Security Threats in Manets
Keywords:
MANETs, Security, Attacks, Wormhole Attack, Black-hole Attack, Gray-hole AttackAbstract
MANETs have very unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are sensitive to different types of attacks in different layers of protocol stack. Each node in a MANETs is capable of acting as a router. Routing is one of the aspects having various security concerns. MANETs has no rigid line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of mischievous nodes, one of the main challenges in MANETs is to design the robust security solution that can protect MANETs from various routing attacks. This paper present survey of common attacks on network layer namely Black-hole, Wormhole and Gray-hole attack which are serious threats for MANETs. This paper also discusses some proposed solutions which help to detect and prevent these attacks. MANETs can operate in isolation or in coordination with a wired infrastructure, often via a gateway node participating in both networks for traffic relay. This flexibility, along with their self-organizing powers, is one of MANET's biggest strengths, as well as their biggest security weaknesses.
References
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
Bo-Cang Peng and Chiu-Kuo Liang “Prevention techniques for flooding attack in Ad Hoc Networks”, IEEE, 2006
Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris, “A High-Throughput Path Metric for Multi-Hop Wireless routing”, in ACM Mobicom, 2003.
D.M. Shila, and T. Anjali, “Defending selective forwarding attacks in WMNs”, IEEE International Conference on Electro/Information Technology, 2008, 96-101.
X.P. Gao; and W. Chen, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[C]”, IFIP International Conference on Network and Parallel Computing Workshops, 2007, 209-214.
Hongmei Deng, Wei Li, and Dharma P.Agrawal,“Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, vol. 40,Issue: 10, 2002
Tamilselvan L, and Sankaranarayanan V, “Prevention of Black hole Attack in MANET”, Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.
Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning system against black hole attack in AODV based Manet”, International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp.: 54-59,
Nital Mistry, Devesh C Jinwala, Member, IAENG, and Mukesh Zaveri, “Improving AODV Protocol against Black hole Attacks”, IMECS2010
Hakem Beitollahi ⇑, Geert Deconinck (2012), Analysing well-known countermeasures against distributed denial of service attacks, Elsevier journal, vol 35, pages 1312-1332.
Ningrinla Marchang a, Raja Datta (2008), Collaborative techniques for intrusion detection in Mobile ad-hoc networks, Elsevier journal, vol 6, pages 508-523.
Sudip Misra, P. Venkata Krishna,_, Kiran Isaac Abraham, Navin Sasikumar, S. Fredun(2010), An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Elsevier journal,vol. 60,pages 294-306.
Hung-Jen Liao, Chun-HungRichardLin, Ying-ChihLin, Kuang-YuanTung (2013), Intrusion detection system: A comprehensive review, Elsevier journal, vol.36, pages 16-24.
Shelly Xiaonan Wu, Wolfgang Banzhaf (2010), the use of computational intelligence in intrusion detection systems: A review, Elsevier journal, vol.10, pages 1-35
Adrian P. Lauf, Richard A. Peters, William H. Robinson(2010), A distributed intrusion detection system for resource-constrained devices in ad-hoc networks, Elsevier journal,vol.8,pages 253-266
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
