CFP last date
20 May 2024
Reseach Article

An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective

by Jayraj Singh, Arunesh Singh, Raj Shree
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 9
Year of Publication: 2011
Authors: Jayraj Singh, Arunesh Singh, Raj Shree
10.5120/2989-3931

Jayraj Singh, Arunesh Singh, Raj Shree . An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective. International Journal of Computer Applications. 24, 9 ( June 2011), 34-39. DOI=10.5120/2989-3931

@article{ 10.5120/2989-3931,
author = { Jayraj Singh, Arunesh Singh, Raj Shree },
title = { An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 9 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number9/2989-3931/ },
doi = { 10.5120/2989-3931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:33.495996+05:30
%A Jayraj Singh
%A Arunesh Singh
%A Raj Shree
%T An Assessment of Frequently Adopted Unsecure Patterns in Mobile Ad hoc Network: Requirement and Security Management Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 9
%P 34-39
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile Ad hoc network (MANET) has played an imperative role in making very fast connection of mobile devices without including any centralize equipment. It is the simplest way to transfer files between two or more devices that can also act as routers. Now a day, the appropriate uses of this modern wireless communication are in emergency rescue situation, military scenarios, sensor networks, conferences and many others. Mobile Ad hoc Networks are adopted when wired networks are malfunctioning or broken down due to some unavoidable situation. This rapidly deployed network collaborates without using any preexisting fixed network infrastructure. Due to rapid deployment of mobile nodes or frequent change in network topology, security is the most important concern in Mobile Ad hoc Network. Due to its limited physical security, energy constrained operations and lack of centralized administration; Ad hoc Networks are more vulnerable to attacks than a wired networks or traditional networks. With the proliferation of cheaper, small, and more powerful mobile devices, mobile ad hoc networks (MANETs) have become one of the fastest growing areas of research. In this paper we are attempting to analyze the security attacks in Ad-hoc environment and focusing on various areas of security requirement, different types of active and passive attacks in Ad-hoc networks.

References
  1. Sudhir Agrwal, Sanjeev Jain, Sanjeev Sharma , “ A survey of Routing attacks and security Measures in mobile Adhoc networks”, Journal of Computing, Vol.3, Issue 1, (2011), pp.41-48 .
  2. L. Zhou, Z.J.Haas ,“ Securing Ad-hoc Networks”, IEEE Network, (1999),pp. 24-30
  3. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei ,“A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security, Springer, (2006).
  4. Hoang Lan Nguyen, Uyen Trang Nguyen “A study of different types of attacks on multicast in mobile ad hoc networks”, Journal of Ad Hoc Networks, Vol.6, (2006), pp.32-46.
  5. Panagiotis Papadimitratos and Zygmunt J. Hass “ Secure Routing for Mobile Ad Hoc Networks ” Proceedings of the SCS Communication Networksand Distributed Systems Modeling and Simulation Conferencee, (2002), pp.1-13.
  6. Monika, Mukesh kumar, Rahul Rishi “ Security Aspects in mobile ad hoc networks (MANETs)Technical Review ”, International journal of Computer Applications,(2010), Journal Number 2, Article 6, pp.37-43.
  7. Abhay Kumar Rai, Rajiv Ranjan Tewari, Saurabh Kant Upadhya ,“ Different Types of Attacks on Integrated MANET-Internet Communication”, International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3), pp.265-274.
  8. Jie Yang, Yingying Chen, Trappe, W.,” Detecting Spoofing Attacks in Mobile Wireless Environments”, proceedings of 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc communications and Networks, (2009), pp.1-9.
  9. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia hang, “Security in mobile ad hoc networks: Challenges and solutions,”IEEE Wireless Communications, Vol. 11, (2004), pp. 38-47.
  10. T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. SivaRam Murthy,”Quality Of Service Provisioning In Ad Hoc Wireless Networks: A Survey of Issues And Solutions. AdHoc Networks”, Ad Hoc Networks, Vol.4, pp. 83–124.
  11. Wenjia Li and Anupam Joshi ,” Security Issues in Mobile Ad hoc networks (A Survey)”, The 17 th White House Papers Graduate Research In Informatics at Sussex, (2004), pp.1-23.
  12. Haifeng Yu; Kaminsky, M., Gibbons, P.B., Flaxman, A.D., “Sybil Guard: Defending against Sybil Attacks via Social Networks”, IEEE/ACM Transactions on Networking, Vol.16, Issue-3, (2008), pp.576-589.
  13. Pal S, Mukhopadhyay AK, Bhattacharya P., “Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks”, IETE Tech Rev, (2008), Vol.25, pp.209-214.
  14. Y.C.Hu, A.Perrig, and D.Johnson,“Wormhole Attacks in Wireless Networks”, IEEE Journal on Selected Areas in Communications, Vol.24, No.2, (2006) pp. 370-380.
  15. Earl McCune, “DSSS vs. FHSS narrowband Interference performance Issues”, Magzine RF Signal Processing, (2000), pp. 90-104.
  16. W. Lou and Y. Fang, “A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions,” Ad Hoc Wireless Networking, X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Publisher, Mar. 2003.
  17. Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park,”Black hole attack in mobile Ad Hoc networks”, In Proceedings of ACM Southeast Regional Conferenc, (2004), pp.96-97.
  18. Rajib Das, Dr. Bipul Syam Purkayastha, Dr. Prodipto Das,“Security Measures for Black Hole Attack in MANET:an approach”, International Journal of Engineering Science and Technology, (2011), Vol.3, No.4, (2011), pp.2832-2838.
  19. Shishir K.Shandilya ,Sunita Sahu,”A Trust Based Security Scheme for RREQ Flooding attack in manet”, International Journal of Computer Applications, Vol.5, No.12, (2010), pp. 0975 – 8887.
  20. Ali Ghaffari,” Vulnerability and Security of Mobile Ad hoc Networks”, Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, (2006), pp.124-129.
  21. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour,“A survey of Routing Attacks in Mobile Ad Hoc Networks”, IEEE Wireless Communications,Vol.14, Issue 5, (2007), pp.85-91.
  22. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia Zhang,“Security in mobile ad hoc networks: Challenges and solutions”, IEEE Wireless Communications, Vol. 11, (2004), pp.38-47.
  23. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, “ Ariadne: A secure on-demand routing protocol for ad hoc networks”, Wireless Networks, Vol.11(1-2), (2005), pp.21–38,
  24. Rajendra V. Boppana Xu Su, “Secure Routing Techniques to Mitigate Insider Attacks in Wireless Ad Hoc Networks”, Proceedings of IEEE Wireless Hive Networks Symposium, (2007).
  25. Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, and Leonard Barolli, “Anonymous Routing in Wireless Mobile Ad hoc networks to prevent location Disclosure Attacks”, In Proceedings of EUC Workshops'2005, pp.238~247.
  26. Jeffrey Dwoskin, Dahai Xu, Jianwei Hung, Mung Chiang, Ruby Lee, “Secure Key Management Architecture Against Sensor Node Fabrication Attack”, Proceedings of IEEE GLOBECOM, (2007), pp.166-171.
  27. S. Sharma, Rajshree, R.P. Pandey, V. Shukla, “Bluff-Probe Based Black Hole Node Detection and prevention”, Proceedings of IEEE international Conference, IACC 2009, pp. 458-461.
  28. Rajshree, Ravi Prakash Pandey, Sanjeev Sharma, Vivek Shukla, “SRIP: A Secure Hybrid Routing Information Protocol for WSN”, Chapter in Strategic Pervasive Computing Applications: Emerging Trends, (2010), pp.99-110.
  29. Raj Shree, Sanjay Kr. Dwivedi and Ravi Prakash Pandey. “Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks”, International Journal of Computer Applications, Vol.18 (5), (2011), pp. 6-10.
Index Terms

Computer Science
Information Sciences

Keywords

Security Goal Security Attacks