CFP last date
22 April 2024
Reseach Article

Comprehensive Survey of Security Issues in Routing Protocols of Manets

by Nisha Yadav, Ritu Taneja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 18
Year of Publication: 2015
Authors: Nisha Yadav, Ritu Taneja
10.5120/21800-5108

Nisha Yadav, Ritu Taneja . Comprehensive Survey of Security Issues in Routing Protocols of Manets. International Journal of Computer Applications. 122, 18 ( July 2015), 18-22. DOI=10.5120/21800-5108

@article{ 10.5120/21800-5108,
author = { Nisha Yadav, Ritu Taneja },
title = { Comprehensive Survey of Security Issues in Routing Protocols of Manets },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 18 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number18/21800-5108/ },
doi = { 10.5120/21800-5108 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:53.767228+05:30
%A Nisha Yadav
%A Ritu Taneja
%T Comprehensive Survey of Security Issues in Routing Protocols of Manets
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 18
%P 18-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A network that consists of several free mobile nodes competent to move in any direction and allied from end to end through wireless links is termed as Mobile Ad hoc Networks (MANETS). MANET is basically the self-configured network supporting various modernistic applications. MANET's security is important because of wide range of multimedia programs and software running in an infrastructure-less environment, limited power and vibrant topology making it highly susceptible to severe security issues. This paper presents a review of security threats such as dynamic and reflexive attacks, threats such as black hole and wormhole, eavesdropping, spoofing, denial of service, flooding and rushing attack etc. and summarizes the proposed solutions for handling these security liabilities by debating about various routing protocols that deliver security in MANETs.

References
  1. Anne Marie Hegland, Eliwinjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, And Pål Spilling, "A survey of key management in ad hoc networks", IEEE communications, 2006.
  2. Mazda Salmanian, Ming Li, 'Enabling secure and reliable policy-based routing in MANETs", IEEE Trans. 2013. M. Rajesh Babu et al. , An Energy Efficient Secure Authenticated Routing Protocol for Mobile Ad hoc Networks. International Journal of Reviews in Computing, Vol. 7, Sep. 2011.
  3. Neetu Singh Chouhan and Shweta Yadav "Flooding Attacks Prevention in MANET", International Journal of Computer Technology and Electronics Engineering, Vol. 1, No. 3, pp. 68-72, 2011.
  4. Robinpreet Kaur & Mritunjay Kumar Rai, A Novel Review on Routing Protocols in MANETs, Undergraduate Academic Research Journal (UARJ), ISSN : 2278 – 1129, Volume-1, Issue-1, 2012
  5. C. S. R. Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols", New Jersey: Prentice Hall, 2004.
  6. H. Gossain, C. D. M. Cordeiro, and D. P. Agrawal, "Multicast Over Wireless Mobile Ad Hoc Networks: Present and Future Directions", IEEE Network, Vol. 17, No. 1, pp. 52-59, Jan. -Feb. 2003.
  7. P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), SanAntonio, TX, January 2002. .
  8. Hubaux J. -P. , Buttyan L. , Capkun S. , "The Quest for Security in Mobile Ad Hoc Networks", ACM Symposium on Mobile Ad hoc Networking And Computing, 2001.
  9. Monika, Mukesh Kumar, Rahul Rishi, "Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review", International Journal of Computer Applications (0975 – 8887), Volume 12– No. 2, November 2010.
  10. Kashyap Balakrishnan, Jing Deng, Pramod K. Varshney, "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks", IEEE, 2005.
  11. Amit N. Thakare et al. , Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks, International Conference on Advanced Information, Networking and Applications, May. 2009.
  12. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia Zhang, "Security in mobile ad hoc networks: Challenges and solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, Feb. , 2004.
  13. Claude Crrepeau et al. , A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. IEEE Transactions on Vehicular Technology, Jan. 2009
  14. B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering, Florida Atlantic university http://student. fau. edu/jchen8/web/papers/SurveyBookchapter. pdf
  15. B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto and A. Jamalipour, "Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks," Proceedings of the Seventh IEEE International Symposium on Computer Networks (ISCN' 06), pp. 30-35, June 2006.
  16. S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method," International Journal of Network Security, vol. 5, no. 3, pp. 338-346, November 2007.
  17. M. A. Gorlatova, P. C. Mason, M. Wang, L. Lamont, R. Liscano, "Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military Communications Conference, MILCOM 2006, pp. 1-7, October 2006.
  18. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad hoc Networks," Proceedings of 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom'03), San Francisco, CA, vol. 3, pp. 1976-1986, April 2003.
  19. Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks", JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617.
  20. Y. C. Hu, A. Perrig and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proceedings of the ACM Workshop on Wireless Security (WiSe), SanDiego, California, pp. 30-40, September 2003
  21. P. Yi, Z. Dai, S. Zhang, Y. Zhong. , "A New Routing Attack in Mobile Ad Hoc Networks," International Journal of Information Technology, vol. 11, no. 2, 2005.
  22. Security issues and attackes in Mobile Ad hoc Network. http://www. slideshare. net/sunitasahu101/attacks-in-manet
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Networks MANETS Routing Protocols