Open Access Open Access  Restricted Access Subscription or Fee Access

A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v4i5.3001

Abstract


One of the most attractive areas of research is Mobile Ad hoc Networks (MANET), which has a number of movable nodes with no infrastructure. Independent nodes are able to move freely inside or leave the network so mobile ad hoc networks are flexible and dynamic topology, MANETs are simply configurable by themselves, easy to deploy, no need for existing infrastructure, and these abilities make them one of the modern eras for industries. Most dangerous and powerful attacks in MANETs are wormhole attack and detection it is very difficult. This paper seeks to study and analyze challenges, security issues of MANETs and one of the severe attacks “wormhole attack,” and its detection and prevention methods, routing protocols used to identify and prevent this attack. These methods are able to identify and avoid the wormhole attacks; but they are not very efficient and have some weaknesses. There is no common algorithm that fits well against the wormhole attack.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Mobile Ad Hoc Networks; Wormholes; Intrusion Detection; Security; Routing Protocols

Full Text:

PDF


References


Corson, M.S., J.P. Macker, and G.H. Cirincione, Internet-based mobile ad hoc networking. Internet Computing, IEEE, 1999. 3(4): p. 63-70.
http://dx.doi.org/10.1109/4236.780962

Nakamura, M., A. Sakurai, and J. Nakamura, Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors. International Journal of Computer Information Systems and Industrial Management Applications, 2009. 1: p. 125-132.

Maheswari, K. and M. Punithavalli, Performance Evaluation of Packet Loss Replacement using Repetititon Technique in VoIP Streams. International Journal of Computer Information Systems and Industrial Management Applications, 2010. 2: p. 289-296.

Johnson, D.B. and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile computing. 1996, Springer. p. 153-181.
http://dx.doi.org/10.1007/978-0-585-29603-6_5

Perkins, C.E. and E.M. Royer. Ad-hoc on-demand distance vector routing. in Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on. 1999. IEEE.
http://dx.doi.org/10.1109/mcsa.1999.749281

Broch, J., et al. A performance comparison of multi-hop wireless ad hoc network routing protocols. in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking. 1998. ACM.
http://dx.doi.org/10.1145/288235.288256

Mishra, A. and K.M. Nadkarni. Security in wireless ad hoc networks. in The handbook of ad hoc wireless networks. 2003. CRC Press, Inc.
http://dx.doi.org/10.1201/9781420040401.ch30

Ilyas, M., The handbook of ad hoc wireless networks. 2002: CRC press.
http://dx.doi.org/10.1201/9781420040401.ch1

Hubaux, J.-P., L. Buttyán, and S. Capkun. The quest for security in mobile ad hoc networks. in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. 2001. ACM.
http://dx.doi.org/10.1145/501436.501437

Basagni, S., et al., Mobile ad hoc networking. 2004: John Wiley & Sons.
http://dx.doi.org/10.1002/0471656895

Johnson, D., Y. Hu, and D. Maltz, The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. 2007, RFC 4728.

Thong, L.K., Performance Analysis of Mobile Adhoc Network Routing Protocols. 2004, Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA.

Lakshmi, M. and P. Sankaranarayanan, Performance analysis of three routing protocols in wireless mobile ad hoc networks. Information technology journal, 2006. 5(1): p. 114-120.
http://dx.doi.org/10.3923/itj.2006.114.120

Hu, Y.-C., A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
http://dx.doi.org/10.1109/infcom.2003.1209219

Khalil, I., S. Bagchi, and N.B. Shroff. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. 2005. IEEE.
http://dx.doi.org/10.1109/dsn.2005.58

Hu, L. and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. in NDSS. 2004.

Wang, W. and B. Bhargava. Visualization of wormholes in sensor networks. in Proceedings of the 3rd ACM workshop on Wireless security. 2004. ACM.
http://dx.doi.org/10.1145/1023646.1023657

Vu, H., et al., Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks, in Wireless Algorithms, Systems, and Applications. 2008, Springer. p. 491-502.
http://dx.doi.org/10.1007/978-3-540-88582-5_46

Su, X. and R.V. Boppana. On mitigating in-band wormhole attacks in mobile ad hoc networks. in Communications, 2007. ICC'07. IEEE International Conference on. 2007. IEEE.
http://dx.doi.org/10.1109/icc.2007.193

Gorlatova, M.A., et al. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
http://dx.doi.org/10.1109/milcom.2006.302162

Čapkun, S., L. Buttyán, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. 2003. ACM.
http://dx.doi.org/10.1145/986858.986862

Song, N., L. Qian, and X. Li. Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. in Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. 2005. IEEE.
http://dx.doi.org/10.1109/ipdps.2005.471

Chiu, H.S. and K.-S. Lui. DelPHI: wormhole detection mechanism for ad hoc wireless networks. in Wireless Pervasive Computing, 2006 1st International Symposium on. 2006. IEEE.
http://dx.doi.org/10.1109/iswpc.2006.1613586

Sakthivel, T. and R. Chandrasekaran, Detection and prevention of wormhole attacks in MANETs using path tracing approach. European Journal of Scientific Research, 2012. 76(2): p. 240-252.

Wan, Z., K. Ren, and M. Gu, Usor: An unobservable secure on-demand routing protocol for mobile ad hoc networks. Wireless Communications, IEEE Transactions on, 2012. 11(5): p. 1922-1932.
http://dx.doi.org/10.1109/twc.2012.030512.111562

Ngadi, M., R.H. Khokhar, and S. Mandala, A review current routing attacks in mobile ad-hoc networks. International Journal of Computer Science and Security, 2008. 2(3): p. 18-29.

Vivian, D., E.A.P. Alchieri, and C.B. Westphall. Evaluation of qos metrics in ad hoc networks with the use of secure routing protocols. in Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP. 2006. IEEE.
http://dx.doi.org/10.1109/noms.2006.1687606

Naït-Abdesselam, F., Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 2008. 46(4): p. 127-133.
http://dx.doi.org/10.1109/mcom.2008.4481351

Baras, J.S., et al. Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. in Military Communications Conference, 2007. MILCOM 2007. IEEE. 2007. IEEE.
http://dx.doi.org/10.1109/milcom.2007.4455008

Hu, Y.-C., A. Perrig, and D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless networks, 2005. 11(1-2): p. 21-38.
http://dx.doi.org/10.1007/s11276-004-4744-y

Biswas, K. and M.L. Ali, Security threats in mobile Ad Hoc network. Department of Interaction and System Design School of Engineering, march2007, 2007: p. 9-26.

Khatkar, A. and Y. Singh. Performance evaluation of hybrid routing protocols in mobile ad hoc networks. in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on. 2012. IEEE.
http://dx.doi.org/10.1109/acct.2012.86

Khalil, I., S. Bagchi, and N.B. Shroff, MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 2008. 6(3): p. 344-362.
http://dx.doi.org/10.1016/j.adhoc.2007.02.001

Perkins, C.E. and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. in ACM SIGCOMM Computer Communication Review. 1994. ACM.
http://dx.doi.org/10.1145/190809.190336

Smys, S. and G. Josemin Bala, Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). Computers & Electrical Engineering, 2012. 38(3): p. 522-532.
http://dx.doi.org/10.1016/j.compeleceng.2011.03.006

Wolthusen, S.D. and P. Ebinger, Seminar Sicherheit in mobilen Ad-hoc-Netzen. 2006.

Kaba, J.T. and D.R. Raichle. Testbed on a desktop: strategies and techniques to support multi-hop manet routing protocol development. in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. 2001. ACM.
http://dx.doi.org/10.1145/501436.501439

Mo, Z., et al. MURU: A multi-hop routing protocol for urban vehicular ad hoc networks. in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on. 2006. IEEE.
http://dx.doi.org/10.1109/mobiq.2006.340406

Tan, H.X. and W. Seah. Dynamic topology control to reduce interference in MANETs. in Proc. of the 2nd Int’l Conf. on Mobile Computing and Ubiquitous Networking. 2005. Citeseer.

Lin, T., S.F. Midkiff, and J.S. Park. A dynamic topology switch for the emulation of wireless mobile ad hoc networks. in Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on. 2002. IEEE.
http://dx.doi.org/10.1109/lcn.2002.1181865

Ji, L. and M.S. Corson. Differential destination multicast-a manet multicast routing protocol for small groups. in INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 2001. IEEE.
http://dx.doi.org/10.1109/infcom.2001.916314

Viswanath, K., K. Obraczka, and G. Tsudik, Exploring mesh and tree-based multicast. Routing protocols for MANETs. Mobile Computing, IEEE Transactions on, 2006. 5(1): p. 28-42.
http://dx.doi.org/10.1109/tmc.2006.11

Xiao, H., et al. A flexible quality of service model for mobile ad-hoc networks. in Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE.
http://dx.doi.org/10.1109/vetecs.2000.851496

Ge, Y., T. Kunz, and L. Lamont. Quality of service routing in ad-hoc networks using OLSR. in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on. 2003. IEEE.
http://dx.doi.org/10.1109/hicss.2003.1174847

Fossa, C. and T. Macdonald. Internetworking tactical manets. in MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010. 2010. IEEE.
http://dx.doi.org/10.1109/milcom.2010.5680456

Shinohara, M., T. Hara, and S. Nishio. Data replication considering power consumption in ad hoc networks. in Mobile Data Management, 2007 International Conference on. 2007. IEEE.
http://dx.doi.org/10.1109/mdm.2007.25

Sucec, J. and I. Marsic, An efficient distributed network-wide broadcast algorithm for mobile ad hoc networks. 2000, CAIP Technical Report 248, Rutgers University.

Boukerche, A., et al., An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. computer communications, 2005. 28(10): p. 1193-1203.
http://dx.doi.org/10.1016/j.comcom.2004.07.019

Boonkrong, S. and R. Bradford, Authentication in Mobile Ad Hoc Networks.

Irshad, A., et al., Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers, in Security-Enriched Urban Computing and Smart Grid. 2010, Springer. p. 86-95.
http://dx.doi.org/10.1007/978-3-642-16444-6_13

Lou, W., W. Liu, and Y. Fang. SPREAD: Enhancing data confidentiality in mobile ad hoc networks. in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2004. IEEE.
http://dx.doi.org/10.1109/infcom.2004.1354662

Aldabbas, H., et al., Data confidentiality in mobile ad hoc networks. arXiv preprint arXiv:1203.1749, 2012.

Rajaram, A. and S. Palaniswami, THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET‖. International Journal of Engineering Science and Technology, 2010. 2(7): p. 3111-3119.

Chi, L., QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment, in Australian Information Security Management Conference. 2006.

Raychoudhury, V., et al., K-directory community: reliable service discovery in MANET. Pervasive and mobile computing, 2011. 7(1): p. 140-158.
http://dx.doi.org/10.1016/j.pmcj.2010.10.004

Lv, X. and H. Li, Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Information Security, 2013. 7(2): p. 61-66.
http://dx.doi.org/10.1049/iet-ifs.2010.0314

Tamilselvan, L. and V. Sankaranarayanan. Prevention of blackhole attack in MANET. in Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on. 2007. IEEE.
http://dx.doi.org/10.1109/auswireless.2007.61

Su, M.-Y., Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 2011. 34(1): p. 107-117.
http://dx.doi.org/10.1016/j.comcom.2010.08.007

Sen, J., et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks. in Information, Communications & Signal Processing, 2007 6th International Conference on. 2007. IEEE.
http://dx.doi.org/10.1109/icics.2007.4449664

Balakrishnan, V. and V. Varadharajan, Packet drop attack: A serious threat to operational mobile ad hoc networks. Networks and Communication Systems, 2005: p. 18-25.

Hashmi, S. and J. Brooke. Authentication mechanisms for mobile ad-hoc networks and resistance to sybil attack. in Emerging Security Information, Systems and Technologies, 2008. SECURWARE'08. Second International Conference on. 2008. IEEE.
http://dx.doi.org/10.1109/securware.2008.68

Pal, S., A.K. Mukhopadhyay, and P.P. Bhattacharya, Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review, 2008. 25(4): p. 209.
http://dx.doi.org/10.4103/0256-4602.42813

Zhang, Y., W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 2005. IEEE.
http://dx.doi.org/10.1109/infcom.2005.1498472

Jung, S., N. Hundewale, and A. Zelikovsky. Energy efficiency of load balancing in MANET routing protocols. in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on. 2005. IEEE.
http://dx.doi.org/10.1109/snpd-sawn.2005.40

Xing, F. and W. Wang. Understanding dynamic denial of service attacks in mobile ad hoc networks. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
http://dx.doi.org/10.1109/milcom.2006.302178

da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.

Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.

Shivaprakasha, K.S., Kulkarni, M., Energy efficient routing protocols for wireless sensor networks: A survey, (2011) International Review on Computers and Software (IRECOS), 6 (6), pp. 929-943.

Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Amnai, M., Fakhri, Y., Abouchabaka, J., Adaptive fuzzy mobility for delay and throughput sensitive traffic in Ad Hoc networks, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 965-971.

Lakshmi, S., Radha, S., Threshold based selfish queue scheduler in MANETs, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3245-3250.

Kuppuchamy, N.K., Manimegalai, R., Fuzzy logic with hybrid optimization approach for optimal route selection in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 230-237.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize