CFP last date
20 December 2024
Reseach Article

An Investigative Survey of different Security Attacks in MANETs

by Naresh Dobhal, Devashish Pundir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 1
Year of Publication: 2015
Authors: Naresh Dobhal, Devashish Pundir
10.5120/ijca2015905977

Naresh Dobhal, Devashish Pundir . An Investigative Survey of different Security Attacks in MANETs. International Journal of Computer Applications. 126, 1 ( September 2015), 22-30. DOI=10.5120/ijca2015905977

@article{ 10.5120/ijca2015905977,
author = { Naresh Dobhal, Devashish Pundir },
title = { An Investigative Survey of different Security Attacks in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 1 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number1/22517-2015905977/ },
doi = { 10.5120/ijca2015905977 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:19.164130+05:30
%A Naresh Dobhal
%A Devashish Pundir
%T An Investigative Survey of different Security Attacks in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 1
%P 22-30
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs (Mobile Adhoc Networks) are used to build up dynamic wireless networks which have no strictly defined infrastructure and no fixed topology with lucrative flexibilities to be used in various applications. Nodes with malicious intent or misleading behavior can join the adhoc network together with trustworthy nodes easily due to inherent characteristics of MANETs which makes them more prone to several attacks than wired networks. Conventional security policies and mechanisms designed for wired networks are mostly considered inadequate and ineffective for these highly dynamic and resource-constrained Adhoc networks. To design and develop security models for MANETs we must first be intriguing about the possible security attacks that may pounce upon different adhoc network scenarios. This paperwork focusses our attention on a comprehensive review to the various security threats and attacks prevalent in MANETs with the classification being done by taking into account the layered architecture of TCP/IP protocol suite underneath it.

References
  1. Gurnam Singh, Gursewal Singh. “Detection & Prevention of Blackhole using Clustering in MANET using NS2”. IJECS Volume - 3 Issue -8, August 2014.
  2. Arif Sari, Dr. Beran Necat. “Securing mobile ad-hoc networks against jamming attacks through unified security mechanism”. IJASUC Volume - 3, Issue - 3, June 2012
  3. Wenjia Li and Anupam Joshi. “Security Issues in Mobile AdHoc Networks - A Survey”. University of Maryland, Baltimore County.
  4. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato. “A survey of routing attacks in Mobile ad hoc networks”. IEEE wireless communications, October 2007
  5. Shikha Jain. “Security threats in Manet: a review”. IJIT, Vol.3, No.2, April 2014
  6. Mohammad Rafiqul Alam. “Detecting Wormhole and Byzantine Attacks in Mobile ad hoc Networks”. Curtin University of Technology May 2011.
  7. Gagandeep, Aashima, Pawan Kumar. ” Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”. IJEAT, Volume-1, Issue-5, June 2012.
  8. Upma Goyal, Mansi Gupta and Kiranveer Kaur. “Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs”. IJAIEM, Volume 3, Issue 10, October 2014.
  9. R. Sivakami and G. M. Kadhar Nawaz. “Defending against security breaches of byzantine attacks in manets”. ARPN, VOL. 10, NO. 8, MAY 2015
  10. Sevil Şen, John A. Clark, Juan E. Tapiador. “Security Threats in Mobile Ad Hoc Networks”. University of York, YO10 5DD, UK
Index Terms

Computer Science
Information Sciences

Keywords

Internal attacks External attacks Active attacks Passive attacks Blackhole attack Wormhole attack Byzantine attack Flooding attack Colluding Misrelay attack.