CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Protocol Stack based Security Vulnerabilities in MANETs

by Jatinder Pal Singh, Anuj Kr. Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 21
Year of Publication: 2013
Authors: Jatinder Pal Singh, Anuj Kr. Gupta
10.5120/12092-8192

Jatinder Pal Singh, Anuj Kr. Gupta . Protocol Stack based Security Vulnerabilities in MANETs. International Journal of Computer Applications. 69, 21 ( May 2013), 1-7. DOI=10.5120/12092-8192

@article{ 10.5120/12092-8192,
author = { Jatinder Pal Singh, Anuj Kr. Gupta },
title = { Protocol Stack based Security Vulnerabilities in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 21 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number21/12092-8192/ },
doi = { 10.5120/12092-8192 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:30:52.535309+05:30
%A Jatinder Pal Singh
%A Anuj Kr. Gupta
%T Protocol Stack based Security Vulnerabilities in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 21
%P 1-7
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc network is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure & no centralized control. Each mobile node in such a scenario acts as both a router & host. Nodes within each other's radio range communicate directly, while those other nodes that are far apart used as relays. Thus the nodes find a path to the destination node using routing protocols. Minimal configuration & quick deployment make them suitable for emergency situations like war, emergency medical situations etc. Since Mobile Ad-hoc networks lack an infrastructure, they are exposed to a lot of vulnerabilities. In this paper, we present a survey on the protocol stack based security vulnerabilities in MANETs. All these vulnerabilities attempt to affect the overall performance and throughput of the network. The intent of this paper is to classify and explain the security vulnerabilities in the MANET protocol stack.

References
  1. Vikrant Gokhale, S. K. Gosh, and Arobinda Gupta, "Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks a Survey".
  2. Amitabh Mishra, "SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS" (chapter 1, 3), ISBN- 13 978-0-521-87824-1 Handbook.
  3. Wenjia Li and Anupam Joshi, "Security Issues in Mobile Ad Hoc Networks - A Survey".
  4. Mohammad Ilyas, "The Handbook of Ad Hoc Wireless Networks".
  5. Kamanshis Biswas and Md. Liakat Ali, "Security Threats in Mobile Ad Hoc Network".
  6. Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, "Different Types of Attacks on Integrated MANET-Internet Communication," International Journal of Computer Science and Security (IJCSS) Volume: 4 Issue: 3.
  7. Monika, Mukesh Kumar & Rahul Rishi, "Security Aspects in Mobile Ad Hoc Network(MANETs): Technical Review" International Journal of Computer Applications (0975 – 8887) Volume 12– No. 2, November 2010.
  8. B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering, Florida Atlantic University.
  9. N. Shanthi, Dr. Lganesan and Dr. K. Ramar , "Study of Different Attacks on Multicast Mobile Ad hoc Network," Journal of Theoretical and Applied Information Technology.
  10. Hoang Lan and Uyen Trang Nguyen, "Study of Different Types of Attacks on Multicast in Mobile Ad hoc Networks", Proceedings of ICNICONSMCL'06, 0-7695-2552-0/06@ 2006 IEEE.
  11. S. Murphy, "Routing Protocol Threat Analysis," Internet Draft, draft-murphy-threat-00. txt, Octomber 2002.
  12. Sonja Buchegger and Jean-Yves Le Boudec, "Cooperative Routing in Mobile Ad hoc Networks: Current Efforts Against Malice and Selfishness",In Lecture Notes on Informatics, Mobile Internet Workshop, Germany, Octomber 2002. Springer.
  13. Ping Yi, Yue Wu and Futai Zou and Ning Liu, "A Survey on Security in Wireless Mesh Networks", Proceedings of IETE Technical Review, Vol. 27, Issue 1, Jan-Feb 2010.
  14. I. Aad and J. P. Hubaux, E. W. Knightly, "Denial of Service Resilience in Ad hoc Networks", Proceedings of ACM MobiCom 2004, Philadelphia, PA, Sep. 2004, pp. 202-215.
  15. W. Lou, W. Liu, Y. Fang: SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, IEEE INFOCOM, 2004.
  16. T. Bheemarjuna Reddy, I. Karthigeyan, B. S. Manoj, C. SivaRam Murthy. "Quality Of Service Provisioning In Ad Hoc Wireless Networks: A Survey of Issues And Solutions. AdHoc Networks", Ad Hoc NetworksVol. 4, pp. 83–124.
  17. Anuj K. Gupta, Harsh Sadawarti, & Anil k. Verma, (2011) "Review of various Routing Protocols for MANETs," International Journal of Information and Electrical Engineering, ISSN: 1109-2742, Vol. 1 No. 3, pp. – 251-259.
  18. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma "A Review of Routing Protocols for Mobile Ad Hoc Networks" WSEAS Transactions on Communications, ISSN: 1109-2742, Volume 10 Issue11.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs DoS Ad-hoc Security