CFP last date
20 January 2025
Reseach Article

Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

by Monika, Mukesh Kumar, Rahul Rishi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 2
Year of Publication: 2010
Authors: Monika, Mukesh Kumar, Rahul Rishi
10.5120/1649-2218

Monika, Mukesh Kumar, Rahul Rishi . Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review. International Journal of Computer Applications. 12, 2 ( December 2010), 37-43. DOI=10.5120/1649-2218

@article{ 10.5120/1649-2218,
author = { Monika, Mukesh Kumar, Rahul Rishi },
title = { Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 2 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 37-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number2/1649-2218/ },
doi = { 10.5120/1649-2218 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:40.003862+05:30
%A Monika
%A Mukesh Kumar
%A Rahul Rishi
%T Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 2
%P 37-43
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. In a mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, dynamically changing network topology, energy constrained operations and lack of centralized administration. Since all the nodes in the network collaborate to forward the data, the wireless channel is prone to active and passive attacks by malicious nodes, such as Denial of Service (DoS), eavesdropping, spoofing, etc. The intent of this paper is to investigate the security goal, security challenges and different types of active and passive attacks on MANETs.

References
  1. B.G.KIN, “The Quality of Service in The Internet” ,IEEE,0-7803-7093-7/0.
  2. T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. SivaRam Murthy.”Quality Of Service Provisioning In Ad Hoc Wireless Networks: A Survey of Issues And Solutions. AdHoc Networks” , Ad Hoc NetworksVol.4, pp. 83–124,
  3. Shakeel Ahmed A K Ramani, “Exploring the Requirementsfor QoS in Mobile Ad hoc Networks” Journal of Information & Communication Technology, Vol. 1 No. 2,01-09 , (Fall 2007).
  4. IETF MANET Working Group. Mobile Ad Hoc Networks (MANET). Working Group, Charter available at http://www.ietf.org/html.charters/manet-charter.html
  5. Sannella, M. Ilyas, “The Handbook of Ad Hoc Wireless Networks,” CRC Press, 2003.
  6. Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
  7. Kostas Papadopoulos, Theodore Zahariadis, Nelly Leligou, Stamatis Voliotis,” Sensor Networks Security Issues In Augmented Home Environment”, IEEE. ISBN: 978-1-4244-2422-1.
  8. L. Zhou, Z.J. Haas, Cornell Univ., “Securing ad hoc networks,” IEEE Network, Nov/Dec 1999, Volume: 13, Page(s): 24-30, ISSN: 0890-8044..
  9. Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
  10. Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. Security in mobile ad hoc networks Challenge and solution. IEEE wireless communication, 11, 1, (2004), 38-47.
  11. Hubaux J.-P., Buttyan L., Capkun S., “The Quest for Security in Mobile Ad Hoc Networks”, In Proc. of the 2nd
  12. B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, Florida Atlantic niversityhttp://student.fau.edu/jchen8/web/papers/SurveyBookchapter.pdf
  13. Sonja Buchegger and Jean-Yves Le Buddec, “Increasing Routing Security in Mobile ad hoc Network,” IBM Research Report: RR 3354, 2001 ACM Int. Symp. on Mobile Ad hoc Networking & Computing, pp. 146-155, 2001
  14. H Deng, W. Li, and D. Agrawal, Routing Security in Wireless Ad Hoc Networks.IEEE Communications Magazine. Vol. 40, No. 10, 2002
  15. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Security Mobility Attack Vulnerable