Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security Attacks in Mobile Adhoc Networks (MANET): A Literature Survey

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 20
Year of Publication: 2015
Ajay Kumar
Jatinder Singh

Dinesh, Ajay Kumar and Jatinder Singh. Article: Security Attacks in Mobile Adhoc Networks (MANET): A Literature Survey. International Journal of Computer Applications 122(20):31-35, July 2015. Full text available. BibTeX

	author = {Dinesh and Ajay Kumar and Jatinder Singh},
	title = {Article: Security Attacks in Mobile Adhoc Networks (MANET): A Literature Survey},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {20},
	pages = {31-35},
	month = {July},
	note = {Full text available}


Security is actually an essential issue for the secured conversation in between mobile nodes in a dangerous ecosystem. In dangerous situations adversaries can easily group active and inactive assaults opposing intercept able routing in implant inside routing information as well as data packets. In this specific document, we have pay attention to essential security symptoms within Mobile adhoc networks. MANET has no definite defensive structure, so that, it is easily accessible to both trustworthy networking end-users as well as destructive assailants. Within the existence of malware nodes, one of the primary obstacles about MANET is always to develop the sturdy safety alternative which is able to shield MANET from a variety of routing attacks. Conversely, these types of alternative are certainly not appropriate MANET resource limitations, in other words, restricted bandwidth and electric battery power, simply because they introduce hefty traffic bunch to exchange and validating important factors. MANET can run in reclusiveness or perhaps in dexterity by having a wired infrastructure, frequently through the gateway node actively participating both in networks for traffic relay. This Particular versatility, together with their self organizing potential, are a few of MANET's most significant strengths, in addition to their leading safety weak points. In this particular review paper a variety of routing assaults, such as for instance active(flooding, black hole, spoofing, wormhole) and inactive(eavesdropping, traffic monitoring, traffic analysis) are characterized.


  • A Mishra and K. M Nadkarni, security in wireless Ad - hoc network, in Book. The Hand book of Ad Hoc Wireless Networks (chapter 30), CRC press LLC, 2003
  • Jie Wu , Fei Dai, ?Broadcasting in Ad Hoc Networks: Based on Self-Pruning?, Twenty Second Annual Joint Conferences of IEEE Computer and Communication Societies, IEEE INFOCOM 2003
  • K. Sanzgiri, B. Dahill, B. N. Levine, C. shield and E. M Belding- Royar, A secure routing protocol for Ad Hoc Networks, in Proceedings of ICNP'02,2002.
  • Y. Hu, D. Johnson and A Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wire
  • D. Johnson and D. Maltz, ?Dynamic Source Routing in Ad Hoc Wireless Networks,? Mobile Computing, T. Imielinski and H. Korth, Ed. , pp. 153-81. Kluwer, 1996.
  • C. E. Perkins and P. Bhagwat, ?Highly dynamic destination-sequenced distance vector routing for mobile computers?, Comp, Comm. Rev. , Oct. 1994, pp 234-44
  • M. Frodigh, P. Johansson, and P. Larsson. ?Wireless ad hoc networking: the art of networking without a network,? Ericsson Review,No. 4, 2000, pp. 248-263.
  • E. M. Royer and C-K Toh , ?A review of Current routing protocols for Ad Hoc Mobile Wireless.
  • Chlamtac, I. , Conti, M. , and Liu, J. J. -N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp. 13–6.
  • HaoYang, Haiyun & Fan Ye ? Security in mobile adhoc networks : Challenges and solutions,?, Pg. 38-47, Vol11, issue 1, Feb 2004.
  • Luis Bernardo, Rodolfo Oliveira, Sérgio Gaspar, David Paulino and Paulo Pinto A Telephony Application for Manets: Voice over a MANET-Extended JXTA VirtualOverlay Network
  • C. -C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97,Apr. 1997, pp. 197-211
  • Th. Clausen et al. , "Optimized Link State Routing Protocol," IETF Internet draft, draft-ietfmanet-olsr-11. txt, July 2003.
  • B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
  • Z. Karakehayov, "Using REWARD to Detect Team BlackHole Attacks in Wireless Sensor Networks," Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
  • S. Desilva, and R. V. Boppana, "Mitigating Malicious Control Packet Floods in Ad Hoc Networks," Proc. IEEE Wireless Commun. and Networking Conf. , New Orleans, LA,2005.
  • S. Lee, B. Han, and M. Shin, "Robust Routing in Wireless AdHoc Networks," 2002 Int'l. Conf. Parallel Processing Wksps. , Vancouver, Canada, Aug. 18–21, 2002.
  • S. Kurosawa et al. , "Detecting Blackhole Attack on AODVBased Mobile Ad Hoc Networks by Dynamic Learning Method,"Proc. Int'l. J. Network Sec. , 2006.
  • D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, T. Imielinski and H. Korth, Ed. , pp. 153-81. Kluwer, 1996.
  • Jyoti Raju and J. J. Garcia-Luna-Aceves, " A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless networks'," in Proceeding of IEEE ICC, June 2000.
  • Y-C. Hu, A. Perrig, and D. Johnson, "Wormhole Attacks in Wireless Networks," IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  • C. Perkins and E Royer, "Ad Hoc On-Demand Distance Vector Routing," 2nd IEEE Wksp. Mobile Comp. Sys. And Apps. , 1999.