CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Comprehensive Appraisal of Ad hoc Networks

by Amandeep Verma, Manpreet Singh Gujral
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 22
Year of Publication: 2012
Authors: Amandeep Verma, Manpreet Singh Gujral
10.5120/7902-1181

Amandeep Verma, Manpreet Singh Gujral . A Comprehensive Appraisal of Ad hoc Networks. International Journal of Computer Applications. 49, 22 ( July 2012), 12-18. DOI=10.5120/7902-1181

@article{ 10.5120/7902-1181,
author = { Amandeep Verma, Manpreet Singh Gujral },
title = { A Comprehensive Appraisal of Ad hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 22 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number22/7902-1181/ },
doi = { 10.5120/7902-1181 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:54.579030+05:30
%A Amandeep Verma
%A Manpreet Singh Gujral
%T A Comprehensive Appraisal of Ad hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 22
%P 12-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ad hoc network is a group of wireless mobile hosts that are connected momentarily through wireless connections in the dearth of any centralized control or some supporting services. The circumstances where it is likely unrealistic or infeasible to deploy infrastructure, in these cases mobile devices could set up a possibly short lived network for the communication needs of the moment by a quick deployment. Security is a vital issue in an ad hoc network owing to its intrinsic vulnerabilities. These vulnerabilities are nature of its structure that cannot be eliminated. Consequently, attacks with malicious objectives have been and will be devised to exploit these vulnerabilities and to perturb its operations. This paper presents an inclusive study of the ad hoc network in terms of its characteristics, vulnerabilities, challenges, routing, authentication and attacks specific to these types of networks.

References
  1. Mario Gerla, "Adhoc networks: Emerging Applications, Design Challenges and Future Opportunities" Prasant Mohapatra and Srikanth V. Krishnamurthy,(eds), Adhoc Networks: Technologies and Protocols, Springer Verlag, pp. 1-22, 2005
  2. Andr´e Weimerskirch and Gilles Thonet, "A Distributed Light-Weight Authentication Model for Ad-hoc Networks," in Proc. of International Conference on Information Security and Cryptology (ICISC 2001), pp. 341-354, December 2001
  3. Hekmat Ramin, Ad hoc Networks: Fundamental Properties and Network Topologies. Springer , 2006
  4. Mahesh K. Marina and Samir R. Das , " Routing in Mobile Adhoc Networks," P. Mohapatra and S. V. Krishnamurthy(eds), Ad Hoc Networks: Technologies and Protocols, Springer, Sep 2004.
  5. A. Naveed and S. S. Kanhere, "Authentication and Privacy in Wireless Ad-hoc Networks", R. Beyah, J. McNair and C. Corbett (eds. ), Security in Ad-hoc and Sensor Networks, World Scientific Press, July 2009
  6. Li Wenjia and Joshi Anupam ," Security Issues in Mobile Ad hoc networks -A Survey," The 17th White House Papers Graduate Research In Informatics at Sussex, pp. 1-23, 2004.
  7. Farooq Anjum and Petros Mouchtaris, Security for Wirelss Ad hoc Networks. Wiley-InterScience, A John Wiley & Sons Inc. , Publication, 2007
  8. Mishra Amitabh and NadKarni Ketan M. , "Security in Wireless Adhoc Networks," Mohammad Ilyas (ed. ), The Handbook of Adhoc Wireless Networks, Chapter 30, CRC Press, 2003
  9. Yang Hao, Luo Haiyun, Ye Fan, Lu Songwo and Zhang Lixio, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, issue 1, pp. 38-47, Feb 2004
  10. Michele Nogueira Lima, Aldri Luiz dos Santos, and Guy Pujolle, "A Survey of Survivability in Mobile Ad Hoc Networks," IEEE Communications Surveys & Tutorials, vol. 11, no. 1, pp. 66-77, 2009.
  11. Tavli, Bulent and Heinzelman, Mobile Adhoc networks. Wendi 2006,
  12. Changling Liu and Jorg Kaiser, "A Survey of Mobile Ad Hoc Network Routing Protocols," TR-4, MINEMA, University of Magdeburg, October 2005
  13. Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, and Jean-Jacques Quisquat, "Authentication Protocols for Ad Hoc Networks: Taxonomy and Research Issues," in Proc. of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 96-104, 2005
  14. A. O. Salako "Authentication in Ad hoc Networking," in Proc. of London Communications Symposium 2002, 2002
  15. K. Hoeper and G. Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Y. Xiao, X. (Sherman) Shen, and D. -Z. Du (eds. ), Wireless/Mobile Network Security, Springer-Verlag, 2006
  16. Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Adhoc Networks," Xiao, X. Shen, and D. -Z. Du (Eds. ), Wireless/Mobile Network Security, Springer, Chapter 12, pp. 103-135, 2006
  17. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols," IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 78-93, 2008
  18. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato, "A Survey Of Routing Attacks In Mobile Ad Hoc Networks," IEEE Wireless Communications, vol. 14, issue 5, pp. 85-91, October 2007
  19. Marianne A. Azer, Sherif M. El-Kassas and Magdy S. El-Soudani, "A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Ad Hoc Networks," International Journal of Computer Science and Information Security, vol. 1, no. 1, pp. 41-52, May 2009
  20. Khurana S. and Gupta N, "FEEPVR: First End-to-End protocol to Secure Ad hoc Networks with variable ranges against Wormhole Attacks," in Proc. Of IEEE International Conference on Emerging Security Information, Systems and Technologies, pp 74-79, 2008
  21. Dokurer S. , Ert, Y. M and Acar C. E. ," Performance analysis of ad-hoc networks under black hole attacks," in Proceedings of IEEE SoutheastCon, pp. 148-153, 2007
  22. Patcha A and Mishra A, "Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks," in Proc. of IEEE conference on Radio and Wireless, pp. 75-78, 2003
  23. Hyojin Kim, Ramachandra Bhargav Chitti, and JooSeok Song, "Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks," IEEE Transactions on Consumer Electronics, vol. 56, issue 2, pp. 579-582,May 2010
  24. Ali Hamieh and Jalel Ben-Othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution," in Proc. of IEEE Conference on Communications, pp. 1-6, 2009
  25. N. Uushona and W T Penzhorn, "Towards the Security of Routing in Ad Hoc Networks," IEEE International Symposium on Industrial Electronics, pp. 1783-1788, June 2005.
  26. Ming Yu, Kulkarni S. and Lau, P, "A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks, "in Proc. of 13th IEEE International Conference on Networks, pp. 6, Nov 2005
  27. C. Adjih, D. Raffo, and P. Muhlethaler, "Attacks Against OLSR: Distributed Key Management for Security," in Proc. 2nd OLSR Interop/Wksp. , July 2005.
  28. Yih-Chun Hu. and Perrig A. ,"A Survey of Secure Wireless ad hoc routing," IEEE Security and Privacy, vol. 2, issue 3, pp. 28-39, 2004
  29. Esch J. , "Prolog to A Survey of Trust and Reputation Management Systems in Wireless Communications," Proceedings of the IEEE, vol. 98, issue 10, October 2010.
  30. Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Adhoc Networks," Xiao, X. Shen, and D. -Z. Du (Eds. ), Wireless/Mobile Network Security, Springer, Chapter 12, pp. 103-135, 2006
Index Terms

Computer Science
Information Sciences

Keywords

ad hoc networks vulnerabilities attacks