A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols
One of the most attractive areas of research is Mobile Ad hoc Networks (MANET), which has a number of movable nodes with no infrastructure. Independent nodes are able to move freely inside or leave the network so mobile ad hoc networks are flexible and dynamic topology, MANETs are simply configurable by themselves, easy to deploy, no need for existing infrastructure, and these abilities make them one of the modern eras for industries. Most dangerous and powerful attacks in MANETs are wormhole attack and detection it is very difficult. This paper seeks to study and analyze challenges, security issues of MANETs and one of the severe attacks “wormhole attack,” and its detection and prevention methods, routing protocols used to identify and prevent this attack. These methods are able to identify and avoid the wormhole attacks; but they are not very efficient and have some weaknesses. There is no common algorithm that fits well against the wormhole attack.
Copyright © 2014 Praise Worthy Prize - All rights reserved.
Corson, M.S., J.P. Macker, and G.H. Cirincione, Internet-based mobile ad hoc networking. Internet Computing, IEEE, 1999. 3(4): p. 63-70.
Nakamura, M., A. Sakurai, and J. Nakamura, Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors. International Journal of Computer Information Systems and Industrial Management Applications, 2009. 1: p. 125-132.
Maheswari, K. and M. Punithavalli, Performance Evaluation of Packet Loss Replacement using Repetititon Technique in VoIP Streams. International Journal of Computer Information Systems and Industrial Management Applications, 2010. 2: p. 289-296.
Johnson, D.B. and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile computing. 1996, Springer. p. 153-181.
Perkins, C.E. and E.M. Royer. Ad-hoc on-demand distance vector routing. in Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99. Second IEEE Workshop on. 1999. IEEE.
Broch, J., et al. A performance comparison of multi-hop wireless ad hoc network routing protocols. in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking. 1998. ACM.
Mishra, A. and K.M. Nadkarni. Security in wireless ad hoc networks. in The handbook of ad hoc wireless networks. 2003. CRC Press, Inc.
Ilyas, M., The handbook of ad hoc wireless networks. 2002: CRC press.
Hubaux, J.-P., L. Buttyán, and S. Capkun. The quest for security in mobile ad hoc networks. in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. 2001. ACM.
Basagni, S., et al., Mobile ad hoc networking. 2004: John Wiley & Sons.
Johnson, D., Y. Hu, and D. Maltz, The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. 2007, RFC 4728.
Thong, L.K., Performance Analysis of Mobile Adhoc Network Routing Protocols. 2004, Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA.
Lakshmi, M. and P. Sankaranarayanan, Performance analysis of three routing protocols in wireless mobile ad hoc networks. Information technology journal, 2006. 5(1): p. 114-120.
Hu, Y.-C., A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2003. IEEE.
Khalil, I., S. Bagchi, and N.B. Shroff. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. 2005. IEEE.
Hu, L. and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. in NDSS. 2004.
Wang, W. and B. Bhargava. Visualization of wormholes in sensor networks. in Proceedings of the 3rd ACM workshop on Wireless security. 2004. ACM.
Vu, H., et al., Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks, in Wireless Algorithms, Systems, and Applications. 2008, Springer. p. 491-502.
Su, X. and R.V. Boppana. On mitigating in-band wormhole attacks in mobile ad hoc networks. in Communications, 2007. ICC'07. IEEE International Conference on. 2007. IEEE.
Gorlatova, M.A., et al. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
Čapkun, S., L. Buttyán, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. 2003. ACM.
Song, N., L. Qian, and X. Li. Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. in Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. 2005. IEEE.
Chiu, H.S. and K.-S. Lui. DelPHI: wormhole detection mechanism for ad hoc wireless networks. in Wireless Pervasive Computing, 2006 1st International Symposium on. 2006. IEEE.
Sakthivel, T. and R. Chandrasekaran, Detection and prevention of wormhole attacks in MANETs using path tracing approach. European Journal of Scientific Research, 2012. 76(2): p. 240-252.
Wan, Z., K. Ren, and M. Gu, Usor: An unobservable secure on-demand routing protocol for mobile ad hoc networks. Wireless Communications, IEEE Transactions on, 2012. 11(5): p. 1922-1932.
Ngadi, M., R.H. Khokhar, and S. Mandala, A review current routing attacks in mobile ad-hoc networks. International Journal of Computer Science and Security, 2008. 2(3): p. 18-29.
Vivian, D., E.A.P. Alchieri, and C.B. Westphall. Evaluation of qos metrics in ad hoc networks with the use of secure routing protocols. in Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP. 2006. IEEE.
Naït-Abdesselam, F., Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 2008. 46(4): p. 127-133.
Baras, J.S., et al. Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. in Military Communications Conference, 2007. MILCOM 2007. IEEE. 2007. IEEE.
Hu, Y.-C., A. Perrig, and D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless networks, 2005. 11(1-2): p. 21-38.
Biswas, K. and M.L. Ali, Security threats in mobile Ad Hoc network. Department of Interaction and System Design School of Engineering, march2007, 2007: p. 9-26.
Khatkar, A. and Y. Singh. Performance evaluation of hybrid routing protocols in mobile ad hoc networks. in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on. 2012. IEEE.
Khalil, I., S. Bagchi, and N.B. Shroff, MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 2008. 6(3): p. 344-362.
Perkins, C.E. and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. in ACM SIGCOMM Computer Communication Review. 1994. ACM.
Smys, S. and G. Josemin Bala, Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). Computers & Electrical Engineering, 2012. 38(3): p. 522-532.
Wolthusen, S.D. and P. Ebinger, Seminar Sicherheit in mobilen Ad-hoc-Netzen. 2006.
Kaba, J.T. and D.R. Raichle. Testbed on a desktop: strategies and techniques to support multi-hop manet routing protocol development. in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing. 2001. ACM.
Mo, Z., et al. MURU: A multi-hop routing protocol for urban vehicular ad hoc networks. in Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on. 2006. IEEE.
Tan, H.X. and W. Seah. Dynamic topology control to reduce interference in MANETs. in Proc. of the 2nd Int’l Conf. on Mobile Computing and Ubiquitous Networking. 2005. Citeseer.
Lin, T., S.F. Midkiff, and J.S. Park. A dynamic topology switch for the emulation of wireless mobile ad hoc networks. in Local Computer Networks, 2002. Proceedings. LCN 2002. 27th Annual IEEE Conference on. 2002. IEEE.
Ji, L. and M.S. Corson. Differential destination multicast-a manet multicast routing protocol for small groups. in INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 2001. IEEE.
Viswanath, K., K. Obraczka, and G. Tsudik, Exploring mesh and tree-based multicast. Routing protocols for MANETs. Mobile Computing, IEEE Transactions on, 2006. 5(1): p. 28-42.
Xiao, H., et al. A flexible quality of service model for mobile ad-hoc networks. in Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE.
Ge, Y., T. Kunz, and L. Lamont. Quality of service routing in ad-hoc networks using OLSR. in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on. 2003. IEEE.
Fossa, C. and T. Macdonald. Internetworking tactical manets. in MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010. 2010. IEEE.
Shinohara, M., T. Hara, and S. Nishio. Data replication considering power consumption in ad hoc networks. in Mobile Data Management, 2007 International Conference on. 2007. IEEE.
Sucec, J. and I. Marsic, An efficient distributed network-wide broadcast algorithm for mobile ad hoc networks. 2000, CAIP Technical Report 248, Rutgers University.
Boukerche, A., et al., An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. computer communications, 2005. 28(10): p. 1193-1203.
Boonkrong, S. and R. Bradford, Authentication in Mobile Ad Hoc Networks.
Irshad, A., et al., Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers, in Security-Enriched Urban Computing and Smart Grid. 2010, Springer. p. 86-95.
Lou, W., W. Liu, and Y. Fang. SPREAD: Enhancing data confidentiality in mobile ad hoc networks. in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2004. IEEE.
Aldabbas, H., et al., Data confidentiality in mobile ad hoc networks. arXiv preprint arXiv:1203.1749, 2012.
Rajaram, A. and S. Palaniswami, THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET‖. International Journal of Engineering Science and Technology, 2010. 2(7): p. 3111-3119.
Chi, L., QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment, in Australian Information Security Management Conference. 2006.
Raychoudhury, V., et al., K-directory community: reliable service discovery in MANET. Pervasive and mobile computing, 2011. 7(1): p. 140-158.
Lv, X. and H. Li, Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Information Security, 2013. 7(2): p. 61-66.
Tamilselvan, L. and V. Sankaranarayanan. Prevention of blackhole attack in MANET. in Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on. 2007. IEEE.
Su, M.-Y., Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 2011. 34(1): p. 107-117.
Sen, J., et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks. in Information, Communications & Signal Processing, 2007 6th International Conference on. 2007. IEEE.
Balakrishnan, V. and V. Varadharajan, Packet drop attack: A serious threat to operational mobile ad hoc networks. Networks and Communication Systems, 2005: p. 18-25.
Hashmi, S. and J. Brooke. Authentication mechanisms for mobile ad-hoc networks and resistance to sybil attack. in Emerging Security Information, Systems and Technologies, 2008. SECURWARE'08. Second International Conference on. 2008. IEEE.
Pal, S., A.K. Mukhopadhyay, and P.P. Bhattacharya, Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review, 2008. 25(4): p. 209.
Zhang, Y., W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 2005. IEEE.
Jung, S., N. Hundewale, and A. Zelikovsky. Energy efficiency of load balancing in MANET routing protocols. in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on. 2005. IEEE.
Xing, F. and W. Wang. Understanding dynamic denial of service attacks in mobile ad hoc networks. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.
Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.
Shivaprakasha, K.S., Kulkarni, M., Energy efficient routing protocols for wireless sensor networks: A survey, (2011) International Review on Computers and Software (IRECOS), 6 (6), pp. 929-943.
Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.
Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.
Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.
Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.
Amnai, M., Fakhri, Y., Abouchabaka, J., Adaptive fuzzy mobility for delay and throughput sensitive traffic in Ad Hoc networks, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 965-971.
Lakshmi, S., Radha, S., Threshold based selfish queue scheduler in MANETs, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3245-3250.
Kuppuchamy, N.K., Manimegalai, R., Fuzzy logic with hybrid optimization approach for optimal route selection in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 230-237.
- There are currently no refbacks.
Please send any question about this web site to email@example.com
Copyright © 2005-2022 Praise Worthy Prize