CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Security Feature in MANETs – A Review

by Nisar Ahmad Malik, Munishwar Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 11
Year of Publication: 2016
Authors: Nisar Ahmad Malik, Munishwar Rai
10.5120/ijca2016910804

Nisar Ahmad Malik, Munishwar Rai . Security Feature in MANETs – A Review. International Journal of Computer Applications. 145, 11 ( Jul 2016), 11-16. DOI=10.5120/ijca2016910804

@article{ 10.5120/ijca2016910804,
author = { Nisar Ahmad Malik, Munishwar Rai },
title = { Security Feature in MANETs – A Review },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 11 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number11/25321-2016910804/ },
doi = { 10.5120/ijca2016910804 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:30.656650+05:30
%A Nisar Ahmad Malik
%A Munishwar Rai
%T Security Feature in MANETs – A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 11
%P 11-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile Ad-hoc Network is infrastructureless network, self-organizing on demand wireless network. It means the formed network can be deformed on the fly without any centralized control. This gives rise to topology change and in turn exposes MANETs to different security attacks. And to deal with these topology changes different protocols have be devised and discussed in this paper but still these protocols are not fully capable to cope up these challenges and are open to researchers for proper attention. A Mobile Agent has a unique feature to move from one system to another in the same network. This ability helps researchers to cope up with security issues in MANETs to some extent.

References
  1. P. K Pattnaik and Rajib Mall, “Fundamentals of Mobile Computing”, PHI Learning Pvt. Ltd., 2nd Edition, 2014.
  2. Hoebeke Jeroen, Ingrid Moerman, Bart Dhoedt, and Piet Demeester, "An overview of Mobile Ad Hoc Networks: Applications and challenges", Journal Communications Network 3, no. 3, 2004, pp. 60-66.
  3. D. Fife Leslie and Le Gruenwald, "Research issues for data communication in Mobile Ad Hoc Network database systems", ACM SIGMOD Record 32, no. 2, 2003, pp. 42-47.
  4. Shen, Wei-Liang, Chen Chung Shiuan, Kate Ching-Ju Lin, and Kien A. Hua. "Autonomous Mobile Mesh Networks", Mobile Computing, IEEE Transactions on 13, no. 2, 2014, pp. 364-376.
  5. Shakshuki Elhadi M., Nan Kang, and Tarek R. Sheltami, "EAACK—A Secure Intrusion-Detection System for MANETs." Industrial Electronics, IEEE Transactions on 60, no. 3, 2013, pp. 1089-1098.
  6. Lange, Danny B. and Mitsuru Oshima, “Seven good reasons for mobile agents", Communications of the ACM 42. 3, 1999, pp. 88-89.
  7. Bieszczad Andrzej, Bernard Pagurek, and Tony White, "Mobile agents for network management", Communications Surveys & Tutorials, IEEE 1, no. 1, 1998, pp. 2-9.
  8. Roy, Debdutta Barman, and Rituparna Chaki, "MADSN: Mobile Agent Based Detection of Selfish Node in MANET", International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, 2011, pp. 225-235.
  9. Hijazi, Abdulrahman, and Nidal Nasser, "Using mobile agents for intrusion detection in wireless ad hoc networks", In Wireless and Optical Communications Networks, 2005. WOCN 2005. Second IFIP International Conference on Networks, IEEE, 2005, pp. 362-366.
  10. Kumar, Rakesh, and Mayank Dave. "Mobile agent as an approach to improve QoS in vehicular ad hoc network", IJCA Special Issue on Mobile Ad-hoc Networks, MANETs, 2011, pp. 67-72.
  11. Joshi Praveen, "Security Issues in Routing Protocols in MANETS at Network Layer", Procedia Computer Science 3, 2011, pp. 954-960.
  12. Djenouri Djamel, LyesKhelladi and Nadjib Badache. "A Survey of Security Issues in Mobile Ad Hoc Networks", IEEE Communications Surveys 7, No. 4, 2005, pp. 2-28.
  13. Singh, Aarti, and Divya Chadha. "MDIA-Master Directed Incentive Based Approach", International Journal of Computing Academic Research(IJCAR), Volume 2,Number 6, December 2013, pp. 255-265.
  14. P. Albers et al., “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” 1st Int’l. Wksp. Wireless Info. Sys., Ciudad Real, Spain, Apr. 3–6, 2002.
  15. A. B. Smith, “An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks,” 5th Nat’l. Colloq. for Info. Sys. Sec. Edu, May 2001.
  16. O. Kachirski and R. Guha, “Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks,” Knowledge Media Net., Proc. IEEE Wksp., July 10–12, 2002, pp. 153–58.
  17. S Balasubramani, S. K. Rani, K. SujaRajeswari Review on Security Attacks and Mechanism in VANET and MANET" Artificial Intelligence and Evolutionary Computations in Engineering Systems Volume 394 of the series Advances in Intelligent Systems and Computing pp 655-666
  18. S. Buchegger and J. Le Boudec, “Performance Analysis of the CONFIDENT Protocol,” in Proc. of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), June, 2002, pp. 226-236.
  19. A. Majumdar and S. Banerjee, "Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review," Computing and Communication (IEMCON), 2015 International Conference and Workshop on, Vancouver, BC, 2015, pp. 1-5.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs attacks AODV CSRP Mobile Nodes (MA) APVP QoS IDS.