We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey

by Devi. P, A. Kannammal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 4
Year of Publication: 2012
Authors: Devi. P, A. Kannammal
10.5120/5683-7721

Devi. P, A. Kannammal . Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey. International Journal of Computer Applications. 42, 4 ( March 2012), 27-32. DOI=10.5120/5683-7721

@article{ 10.5120/5683-7721,
author = { Devi. P, A. Kannammal },
title = { Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 4 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number4/5683-7721/ },
doi = { 10.5120/5683-7721 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:55.010131+05:30
%A Devi. P
%A A. Kannammal
%T Security Attacks and Defensive Measures for Routing Mechanisms in MANETs – A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 4
%P 27-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Indispensable feature of MANETs is security. MANET is a sort of wireless network communications that can construct itself on the run. One of the significant properties of MANET is dynamic organization. To lodge the varying topology and to provide security, well defined routing algorithms are needed. No protocols detain all the security attacks and provide strategies to prevent them. A network layer protocol is necessary to incorporate all security solution to protect both route and data forwarding operations. The aim of this paper is to analyze security issues and their countermeasures in the ad hoc network layer environment. We discuss the hazards on the network layer and various security protocols.

References
  1. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, pp. 38-47, 2004.
  2. Y. Xiao, X. Shen, and D. -Z. Du (Eds. ), "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", WIRELESS/MOBILE NETWORK SECURITY, Springer, 2006
  3. S. Yi and R. Kravets, "Composite Key Management for Ad Hoc Networks", Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04), pp. 52-61, 2004.
  4. R. Oppliger, "Internet and Intranet Security", Artech House, 1998.
  5. Y. Hu, A Perrig, and D. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks", Proc. of IEEE INFORCOM, 2002.
  6. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
  7. Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security & Privacy, pp. 28-39, 2004. [8 ] Ning P. , Sun K. , "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols", In Proc. of the IEEE Workshop on Information Assurance, pp. 60-67, 2003
  8. Y. Xiao, X. Shen, and D. -Z. Du (Eds. ), "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", WIRELESS/MOBILE NETWORK SECURITY, Springer, 2006
  9. Yih-Chun Hu, Adrian Perrig, and David Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols", ACM Workshop on Wireless Security (WiSe 2003) September 19, 2003, California, U. S. A.
  10. M. Ilyas, "The Handbook of Ad Hoc Wireless Networks", CRC Press, 2003.
  11. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures", Proc. of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
  12. Manel Guerrero Zapata, "Secure Ad hoc On-Demand Distance Vector (SAODV) Routing" INTERNET-DRAFT draft-guerrero-manet-saodv-00. txt, August 2002. First published in the IETF MANET Mailing List (October 8th 2001).
  13. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding-Royer, "A secure routing protocol for ad hoc networks", Proc. of 2002 IEEE International Conference on Network Protocols (ICNP), November 2002, IEEE Press, pp. 78–87
  14. S. Yi, P. Naldurg, R. Kravets, "A security-aware ad hoc routing protocol for wireless networks", The 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), 2002.
  15. P. Papadimitratos, Z. J. Haas, "Secure Routing for Mobile Ad hoc Networks SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)", San Antonio, TX, January27–31, 2002.
  16. Y. -C. Hu, D. B. Johnson, A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", Proc. of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), IEEE, Calicoon, NY, June 2002, pp. 3–13.
  17. Y. -C. Hu, A. Perrig, D. B. Johnson, "ARIADNE: A Secure On-Demand Routing Protocol for Ad hoc Networks", MobiCom 2002, Atlanta, Georgia, USA, September 23–28, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Network-layer Attacks Threats Secure Routing Defense Metrics