We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2

by S. C. Mandhata, S.n. Patro, S.p. Mohanty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 8
Year of Publication: 2012
Authors: S. C. Mandhata, S.n. Patro, S.p. Mohanty
10.5120/6798-9133

S. C. Mandhata, S.n. Patro, S.p. Mohanty . Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2. International Journal of Computer Applications. 45, 8 ( May 2012), 6-11. DOI=10.5120/6798-9133

@article{ 10.5120/6798-9133,
author = { S. C. Mandhata, S.n. Patro, S.p. Mohanty },
title = { Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2 },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 8 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number8/6798-9133/ },
doi = { 10.5120/6798-9133 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:37:35.345531+05:30
%A S. C. Mandhata
%A S.n. Patro
%A S.p. Mohanty
%T Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 8
%P 6-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent days Mobile Ad Hoc Network (MANet) has drawn the attention of many researchers largely owing to the inherent characteristics and varied applicability. Unlike traditional wired network, MANet has no clear line of defense. Moreover, the intrinsic properties of MANet expose many nontrivial security challenges. Security is of the prime concerns for network designers in any network. But for MANet, which allows both legitimate network users and malicious attackers to access the network, security issues have been a permanent concern because of the open shared wireless link and nomadic nature of nodes. We present a classification of MANet security threats based on protocol layers of network, security goals, behaviors, timings. Further, we perform a quantitative evaluation of impact of one of these attacks on an insecure on-demand routing protocol using simulation. Ad Hoc on-demand distance vector (AODV) routing protocol was chosen for the implementation of relative strength of the attack and is analyzed in terms of the magnitude of disruption per adversary

References
  1. C. E. Perkins, "Ad Hoc Networks", Addison Wesley, 2001.
  2. C. Siva Ram Murthy & B. S Manoj, "Mobile Ad Hoc Networks - Architecture & Protocols", Pearson Education, New Delhi,2004.
  3. H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and solutions", IEEE Wireless Communications, pp 38-47,2004.
  4. Amitabh Mishra and Ketan M. Nandkarni, in the Book, "The Handbook of Ad Hoc wireless Networks (Chapter-30)", CRC Press, LLC,2003.
  5. Yongguang Zhang and Wenke Lee, in the Book, "Ad Hoc Network Technologies and Protocols (Chapter-9)", Springer, 2005.
  6. X. Wang, D. Feng, X. Lai and H. Yu, "Collisions for Hash Functions MD4,MD5, HAVAL-128, and RIPMED", Cryptology ePrint Archive, Report 2004/199, http://eprint. iacr. org/, 2004.
  7. C. Kaufman, R. Perlman and M. Speciner, Network Security Private Communication in a Public World", Prentice Hall PTR, A division of Pearson Education, Inc. , 2002.
  8. W. Mehuron, Digital Signature Standard (DSS), U. S. Department of Commerce, National Institute of Standards and Technology (NIST), Information Technology Laboratory (ITL), FIPS PEB 186, 1994.
  9. D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.
  10. C. E. Perkins, S. R. Das, and E. Royer, "Ad-hoc on Demand Distance Vector (AODV)". March 2000, http://www. ietf. org/internal-drafts/draft-ietf-manet-aodv-05. txt
  11. Sevil Sen, John A. Clark, Juan A. Tapiador. "Security Threats in Mobile Ad Hoc Networks", Dept of Comp. Sc, University of York, YO10, UK
  12. T. Issariyakul, in Book "Introduction to Network Simulator NS2", Springer Science + Business Media, LLC,233 Springer City, New York NY 10013, USA, 2009.
  13. http ://www. isi. edu/nsnam/ns/ns-ducumentation. html.
  14. Bing Wu, Jianmin Chen, Ji Wu, Mihaela Cardei "A Survey of Attacks and Counter Measures in Mobile Ad Hoc Networks", Wireless / Mobile Network Security, Springer,2006.
Index Terms

Computer Science
Information Sciences

Keywords

Aodv Attack Manet Ns-2. x Security