CFP last date
20 May 2024
Reseach Article

A Literature Survey on Security Challenges in Mobile Ad Hoc Networks

by E. Gajendran, S. Vijayan, B. Sarvesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 84 - Number 1
Year of Publication: 2013
Authors: E. Gajendran, S. Vijayan, B. Sarvesan
10.5120/14537-2499

E. Gajendran, S. Vijayan, B. Sarvesan . A Literature Survey on Security Challenges in Mobile Ad Hoc Networks. International Journal of Computer Applications. 84, 1 ( December 2013), 1-5. DOI=10.5120/14537-2499

@article{ 10.5120/14537-2499,
author = { E. Gajendran, S. Vijayan, B. Sarvesan },
title = { A Literature Survey on Security Challenges in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 84 },
number = { 1 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume84/number1/14537-2499/ },
doi = { 10.5120/14537-2499 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:46.573892+05:30
%A E. Gajendran
%A S. Vijayan
%A B. Sarvesan
%T A Literature Survey on Security Challenges in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 84
%N 1
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This literature survey summarizes the security challenges and their present solutions in mobile ad hoc network. Basically the ad hoc network is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. Security is an essential requirement in mobile ad hoc network Compared to wired networks; Ad hoc networks are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Especially attacks on mobile ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this research paper, identify the existent security threats on ad hoc faces so far, the security services required to be achieved and the countermeasures for attacks in ad hoc routing protocols. Moreover, in this research paper summarize complete literature survey by collecting information related to various types of attacks and its solution. In this research work finally identified the main issues and new proposed solution to overcome them. Further focus on the finding challenges and related works from which to provide highly secure protocol for MANETs.

References
  1. I. Ilyas, Mahammad,"The hand books of Ad hoc Wireless Networks-II series" CRC Press LLC, USA.
  2. C. Sivarammurthy,B. S. Manoj,"Adhoc wireless networks-II edition", Pearson education of India.
  3. Elizabeth M. Royer, Charles E. Perkins," An Implementation Study of the AODV Routing Protocol" IEEE 2000, vol no. 7803-6596-8/00.
  4. NedaMoghim, FaramarzHendessi, NaserMovehhedinia, "An improvement on wireless ad hoc network routing based on AODV" IEEE 2002, vol. no. 7803-7510-06/02.
  5. Jin Taek Kim, Jeong-Ho Kho, Chang-Young Lee, Do-Won Lee, Cheol-Soo Bang, Geuk Lee," A Safe AODV Security Routing Protocol" -International Conference on Convergence and Hybrid Information Technology 2008, IEEE 2008,vol no. 978-0-7695-3328-5/08.
  6. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour. A Survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, page 86, 2009
  7. Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. of IEEE Inforcom, 2002.
  8. ALI GHAFFARI "Vulnerability and Security of Mobile Ad hoc Networks" proceeding of the 6th WSEAS international conference on simulation, modeling and Optimization, Lisbon, Portugal, September 22-24, 2006
  9. Lidong Zhou Zygmunt J. Haas,"Securing Ad Hoc Networks" IEEE network, special issue on network security, November/December, 1999.
  10. Toby Xu, Ying Cai," Location safety protection in ad hoc networks", published by Elsevier B. V. -vol no. 1570-8705.
  11. Dijiang Huang, Mayank Verma," ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks", 2009 Elsevier B. V. -vol. no. 1570-8705.
  12. Ying Dong, Tat Wing Chimb, Victor O. K. Li, S. M. Yiu b, C. K. Hui,"ARMR: Anonymous routing protocol with multiple routesfor communications in mobile ad hoc networks" 2009 Elsevier B. V. -vol . no. 1570-8705.
  13. Patrick P. C. Lee, IEEE, Vishal Misra, and Dan Rubenstein, "Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks", IEEE 2007-vol. no. 1063-6692.
  14. Davide Cerri and Alessandro Ghioni," Securing AODV: The A-SAODV Secure Routing Prototype" IEEE Communications Magazine in February 2008-vol. no. 0163-6804/08.
  15. Fei Xing, and Wenye Wang," On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures" -IEEE 2010, vol. no. -1545-5971/10.
  16. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani," A Survey of Secure Mobile Ad Hoc Routing Protocols", IEEE 2008, vol. no-1553-877X/08.
  17. Xiaoxin Wu and Bharat Bhargava," AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol", IEEE 2005, vol. no. 1536-1233/05.
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc network (AHN) Security attacks Anonymity Routing algorithms.