CFP last date
22 April 2024
Reseach Article

Countermeasures of Network Layer Attacks in MANETs

Published on December 2011 by Mangesh M Ghonge, Pradeep M Jawandhiya, Dr. M S Ali
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 1
December 2011
Authors: Mangesh M Ghonge, Pradeep M Jawandhiya, Dr. M S Ali

Mangesh M Ghonge, Pradeep M Jawandhiya, Dr. M S Ali . Countermeasures of Network Layer Attacks in MANETs. Network Security and Cryptography. NSC, 1 (December 2011), 1-5.

author = { Mangesh M Ghonge, Pradeep M Jawandhiya, Dr. M S Ali },
title = { Countermeasures of Network Layer Attacks in MANETs },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 1 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /specialissues/nsc/number1/4318-spe002t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Mangesh M Ghonge
%A Pradeep M Jawandhiya
%A Dr. M S Ali
%T Countermeasures of Network Layer Attacks in MANETs
%J Network Security and Cryptography
%@ 0975-8887
%N 1
%P 1-5
%D 2011
%I International Journal of Computer Applications

Security is an essential requirement in mobile ad hoc network (MANETs).In this paper, we proposed the survey of countermeasures of all security attacks of network layer in MANETs. To the best of our knowledge, this is the first paper that explaining all the existing countermeasures of network layer attacks in MANETs. The countermeasures are features or functions that reduce or eliminate security vulnerabilities and attacks

  1. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks ,” Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp, @ 2006 Springer.
  2. Payal N. Raj and Prashant B. Swades, “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET” , IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814.
  3. Latha Tamilselvan and Dr. V Sankaranarayanan, ”Prevention of Blackhole Attack in MANET”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
  4. Zhao Min and Zhou Jiliu1, “Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks”, 2009 International Symposium on Information Engineering and Electronic Commerce.
  5. Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs Networks ,” 32nd IEEE Conference on Local Computer Networks 0742-1303/07 $25.00 © 2007 IEEE.
  6. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki,”A New Cluster based wormhole intrusion detection algorithm for MANET”, International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009
  7. Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il Jung,” WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
  8. S. Capkun, L. Buttyan, and J. Hubaux, Sector: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
  9. L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, Proc. of Networks and Distributed System Security Symposium (NDSS), 2004.
  10. Y. Hu, A Perrig, and D. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks.” Proc. of IEEE INFORCOM, 2002.
  11. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
  12. Vaithiyanathan, Gracelin Sheeba.R, Edna Elizabeth. N, Dr.S.Radha, “A Novel method for Detection and Elimination of Modification Attack and TTL attack in NTP based routing algorithm ”, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing 978-0-7695-3975-1/10 $25.00 © 2010 IEEE.
  13. Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad-Hoc Networks. Proc. of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), pp. 3-13, 2002.
  14. R. Gunasekaran and V. Rhymend Uthariaraj, “Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks “, 2009 Sixth International Conference on Information Technology: New Generations 978-0-7695-3596-8/09 $25.00 © 2009 IEEE
  15. Xiaoxin Wu and David K. Y. Yau, “Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach”,. ASIACCS’07, March 20-22, 2007, Singapore.
  16. Yongjin Kim, Vishal Sankhla, Ahmed Helmy1,” Efficient Traceback of DoS Attacks using Small Worlds in MANET”, Proc. 2004 IEEE.
  17. Gao Xiaopeng and Chen Wei, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks”, 2007 IFIP International Conference on Network and Parallel Computing – Workshops @ 2007 IEEE.
  18. Athichart Tangpong, George Kesidis, Hung-yuan and Hsu Ali Hurson, “Robust Sybil Detection for MANETs ” 978-1-4244-4581-3/09/$25.00 ©2009 IEEE.
  19. Muhammad Zeshan, Shoab A.Khan, Ahmad Raza Cheema, Attique Ahmed,” Adding Security against Packet Dropping Attack in Mobile Ad hoc Networks”, 2008 International Seminar on Future Information Technology and Management Engineering 978-0-7695-3480-0/08 $25.00 © 2008 IEEE.
  20. Tarag Fahad1, Djamel Djenouri2, Robert Askwith1, “On Detecting Packets Droppers in MANET: A Novel Low Cost Approach ”Third International Symposium on Information Assurance and Security 0-7695-2876-7/07 $25.00 © 2007 IEEE
  21. Claude Cr´epeau, Carlton R. Davis and Muthucumaru Maheswaran, “A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes ”, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 0-7695-2847-3/07 $20.00 © 2007 IEEE.
  22. Sergey Chapkin, Boto Bako, Frank Kargl, Elmar Schoch,” Location Tracking Attack in Ad hoc Networks based on Topology Information ”, 1-4244-0507-6/06/$20.00 ©2006 IEEE.
  23. Ljubica Blazevic, Jean-Yves Le Boudec and Silvia Giordano, “A Location-Based Routing Method for Mobile Ad Hoc Networks ”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 2, MARCH/APRIL 2005.
Index Terms

Computer Science
Information Sciences


MANET Security attacks Network Layer Network Layer