CFP last date
20 June 2024
Reseach Article

Survey of Cryptography Techniques against Impersonation Attacks in MANET

Published on June 2018 by P. Kavitha, Rajewsari Mukesh
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT2017 - Number 1
June 2018
Authors: P. Kavitha, Rajewsari Mukesh

P. Kavitha, Rajewsari Mukesh . Survey of Cryptography Techniques against Impersonation Attacks in MANET. International Conference on Communication, Computing and Information Technology. ICCCMIT2017, 1 (June 2018), 1-8.

author = { P. Kavitha, Rajewsari Mukesh },
title = { Survey of Cryptography Techniques against Impersonation Attacks in MANET },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { June 2018 },
volume = { ICCCMIT2017 },
number = { 1 },
month = { June },
year = { 2018 },
issn = 0975-8887,
pages = { 1-8 },
numpages = 8,
url = { /proceedings/icccmit2017/number1/29476-1706/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Proceeding Article
%1 International Conference on Communication, Computing and Information Technology
%A P. Kavitha
%A Rajewsari Mukesh
%T Survey of Cryptography Techniques against Impersonation Attacks in MANET
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%N 1
%P 1-8
%D 2018
%I International Journal of Computer Applications

Security is the main concern in Mobile Ad Hoc Networks (MANETs). There are numerous malicious activities performed on single as well as multi-layer of the MANET. Unlike specific layer attacks, the multi-layer attacks are intelligent, since they can coordinate the misbehaving activities in various layers and launch further sophisticated attacks. Most of the research works have focused only on the specific layer attacks. However, there is little progress in providing secure communication against multi-layer attacks. The security against impersonation attack is difficult and to provide the multi-layer protection becomes crucial. To meet the security requirements, several security algorithms have been proposed. However, solutions to the impersonation attack are still incomplete. The routing behavior analysis is insufficient to provide multi-layer protection against impersonation attack, and thus the cryptographic mechanism is widely used for providing authentication and preventing impersonation in MANET. This work conducts a survey on network attacks and conventional security solutions with its advantages and limitations. Finally, this work explores the complexities of symmetric, asymmetric, and group key management.

  1. Nie, Pin. "Security In Ad Hoc Network. ", 2006.
  2. Wu B, Chen J, Wu J, Cardei M. , "A Survey Of Attacks And Countermeasures In Mobile Ad Hoc Networks", In Wireless Network Security, Springer, Pp. 103-135, 2007.
  3. Daza V, Herranz J, Morillo P, Ràfols C. , "Cryptographic Techniques For Mobile Ad-Hoc Networks", Computer Networks, Vol. 51, No. 18, Pp. 4938-50, 2007.
  4. Anantvalee, T. , & Wu, J "A Survey On Intrusion Detection In Mobile Ad Hoc Networks", In Wireless Network Security, Springer, Pp. (159-180), 2007.
  5. Zhang, C. , Zhu, X. , Song, Y. , & Fang, Y, "A Formal Study Of Trust-Based Routing In Wireless Ad Hoc Networks", Ieee Infocom, Pp. (1-9), 2010.
  6. Martinovic, I. , Pichota, P. , Schmitt, "J. B. : Jamming For Good: Design And Analysis Of A Crypto-Less Protection For Wsns", In: Proceedings Of The Second Conference On Wireless Network Security (Wisec) (March 2009).
  7. Balarengadurai, C. And Saraswathi, S. , "Comparative Analysis Of Detection Of Ddos Attacks In Ieee 802. 15 For Low Rate Wireless Personal Area Network", Procedia Engineering, Vol. 38, Pp. 3855-3863, 2012.
  8. Kannhavong, Bounpadith, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, And Abbas Jamalipour. "A Survey Of Routing Attacks In Mobile Ad Hoc Networks" ,Ieee Wireless Communications, Vol. 14, No. 5, Pp. 85-91, 2007.
  9. Nadeem, Adnan, And Michael P. Howarth. "A Survey Of Manet Intrusion Detection & Prevention Approaches For Network Layer Attack. ", Ieee Communications Surveys & Tutorials, Vol. 15, No. 4, Pp. 2027-2045, 2013.
  10. Pal, Sarit, Asish K. Mukhopadhyay, And Parthapratim Bhattacharya. "Defending Mechanisms Against Sybil Attack In Next Generation Mobile Ad Hoc Networks. " ,Iete Technical Review 25. 4 (2008): 209-215.
  11. Goyal P, Parmar V, Rishi R. "Manet: Vulnerabilities, Challenges, Attacks, Application", Ijcem International Journal Of Computational Engineering & Management,2011 .
  12. Grover, Jyoti, Manoj Singh Gaur, And Vijay Laxmi. "A Novel Defense Mechanism Against Sybil Attacks In Vanet", Proceedings Of The 3rd International Conference On Security Of Information And Networks. Acm, 2010.
  13. Awerbuch, B. , Holmer, D. , Nita-Rotaru, C. , & Rubens, H. "An On-Demand Secure Routing Protocol Resilient To Byzantine Failures", Inproceedings Of The 1st Acm Workshop On Wireless Security (Pp. 21-30). Acm 2002.
  14. Deb, N. , &Chaki, N. , "Tids: Trust-Based Intrusion Detection System For Wireless Ad-Hoc Networks", In Computer Information Systems And Industrial Management Springer, Pp. 80-91), 2012
  15. Pankaj Sharma And Yogendra Kumar Jain, "Trust Based Secure Aodv In Manet", Journal Of Global Research In Computer Science, Vol. 3, No. 6, 2012
  16. Dalal, R. , Khari, M. , & Singh, Y, "Survey Of Trust Schemes On Ad-Hoc Network", In Advances In Computer Science And Information Technology. Networks And Communications, Springer, Pp. 170-180, 2012.
  17. Amiri, E. , Keshavarz, H. , Heidari, H. , Mohamadi, E. , &Moradzadeh, H. , "Intrusion Detection Systems In Manet: A Review", Procedia-Social And Behavioral Sciences, 129, Pp. 453-459, 2014
  18. Khan, M. S. , Jadoon, Q. K. , & Khan, M. I. "A Comparative Performance Analysis Of Manet Routing Protocols Under Security Attacks", In Mobile And Wireless Technology 2015 (Pp. 137-145). Springer Berlin Heidelberg, 2015.
  19. Hernandez-Orallo, E. , Serrat, M. D. , Cano, J. C. , Calafate, C. T. , & Manzoni, P. , "Cocowa: A Collaborative Contact-Based Watchdog For Detecting Selfish Nodes", 2014
  20. Kim,Y. , Perrig, A. , And Tsudik, G. " Simple And Fault-Tolerant Key Agreement For Dynamic Collaborative Groups", Technical Report 2, Usc Technical Report 00-737, 2002
  21. Kim, Y. , Perrig, A. , And Tsudik, G "Simple And Fault-Tolerant Key Agreement For Dynamic Collaborative Groups", In 7th Acm Conference On Computer And Communications Security, Pp. 235-244, Acm Press,2000.
  22. Steiner, M. , Tsudik, G. , And Waidner, M "Cliques: A New Approach To Group Key Agreement. Ieee Transactions On Parallel And Distributed Systems",2000.
  23. Cocks, C. "An Identity Based Encryption Scheme Based On Quadratic Residues. In Proc. Ima Conference On Cryptography And Coding", Lncs, Springer,Pp. 360–36,2000.
  24. Hubaux, J. , Buttyan, L. , And Capkun, S. "The Quest For Security In Mobile Ad Hoc Networks", In Proc. Of The Acm Symposium On Mobile Ad Hoc Networking & Computing , 2001(Mobihoc 2001).
  25. Capkun, S. , Buttya, L. , And Hubaux, P "Self-Organized Public Key Management For Mobile Ad Hoc Networks", Ieee Trans. Mobile Computing, Vol. 2, No. 1, Pp. 52-64,2003.
  26. Chen, L. , And Kudla, C. " Identity Based Authenticated Key Agreement Protocolsfrom Pairings", Tech. Rep. Hpl-2003-25, Hewlett Packard Laboratories, Feb. 12 2003.
  27. Clausen, T. , And Jacquet, P. Rfc3626 " Optimized Link State Routing Protocol (Olsr), 2003.
  28. Rafaeli, S. And Hutchison, D. (2003). "A Survey Of Key Management For Secure Group Communication", Acm Computing Surveys, Vol. 35, No. 3, Pp. 309-329.
  29. Sherman, T. And Mcgrew, A. "Key Establishment In Large Dynamic Groups Using One-Way Function Trees", Ieee Transactions On Software Engineering, Vol. 29, No. 5, Pp. 444-458, 2003.
  30. Chien, H. -Y. , And Lin, R. -Y. "Identity-Based Key Agreement Protocol For Mobile Ad-Hoc Networks Using Bilinear Pairing", In Proc. Sensor Networks, Ubiquitous, And Trustworthy Computing , Ieee, Pp. 520–529, 2006.
  31. Chien, H. -Y. , And Lin, R. -Y " Improved Id-Based Security Framework For Ad Hoc Network", Ad Hoc Network ,47–60, 2002. .
  32. D. Benetti, M. Merro, And L. Vigan`O, "Model Checking Ad Hoc Network Routing Protocols: Aran Vs. Endair A," In Proceedings Of The 8th Ieee International Conference On Software Engineering And Formal Methods (Sefm '10), Pp. 191–202, September 2010.
  33. S. Lu, L. Li, K. -Y. Lam, And L. Jia, "Saodv: A Manet Routing Protocol That Can Withstand Black Hole Attack," In Proceedings Of The International Conference On Computational Intelligence And Security (Cis '09), Pp. 421–425, Beijing, China, December 2009.
  34. C. H. Lin, W. S. Lai, Y. L. Huang, And M. Chou, "I-Sead: A Secure Routing Protocol Formobileadhoc Networks," Multimedia And Ubiquitous Engineering, Vol. 1, No. 1, Pp. 102–107, 2008.
  35. M. O. Pervaiz, M. Cardei, And J. Wu, "Routing Security In Ad Hoc Wireless Networks," Network Security, Pp. 117–142, 2010.
  36. M. Sbeiti, A. Wolff, And C. Wietfeld, "Paser: Position Aware Secure And Efficient Route Discovery Protocol Forwireless Mesh Networks," In Proceedings Of The 5th International Conference On Emerging Security Information, Systems And Technologies (Securware '11), Pp. 63–70, Saint Laurent Du Var, France, August 2011.
  37. S. Madria And J. Yin, "Serwa: A Secure Routing Protocol Against Wormhole Attacks In Sensor Networks," Ad Hoc Networks, Vol. 7, No. 6, Pp. 1051–1063, 2009.
  38. H. -M. Sun, C. -H. Chen, C. -W. Yeh, And Y. -H. Chen, "A Collaborative Routing Protocol Against Routing Disruptions In Manets," Personal And Ubiquitous Computing, Vol. 17, No. 5, Pp. 865–874, 2013.
Index Terms

Computer Science
Information Sciences


Wireless Networks Secure Communication Protocol Cryptography Key Management And Impersonation