We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)

by Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 4
Year of Publication: 2013
Authors: Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal
10.5120/11568-6871

Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal . Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET). International Journal of Computer Applications. 68, 4 ( April 2013), 25-29. DOI=10.5120/11568-6871

@article{ 10.5120/11568-6871,
author = { Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal },
title = { Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 4 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number4/11568-6871/ },
doi = { 10.5120/11568-6871 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:55.143043+05:30
%A Rakesh Kumar Singh
%A Rajesh Joshi
%A Mayank Singhal
%T Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 4
%P 25-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-Hoc Network (MANET) is a collection of mobile nodes communicating in a multi hop way without any fixed infrastructure such as access points or base stations. Mobile ad hoc networks have several advantages over the traditional wired networks, on the other sides they have a unique set of challenges like MANETs face challenges in secure communication, mobile nodes without adequate protection are easy to compromise, static configuration may not be adequate for the dynamically changing topology in terms of security solution and finally, lack of cooperation and constrained capability is common in MANET. MANET has not well specified defense mechanism, so malicious attacker can easily access this kind of network. Although security issues in Mobile Ad-hoc Networks (MANETs) have been a major focus in the recent years, the development of most secure schemes for these networks has not been entirely achieved till now. This research paper will provide an overview about the security issues and available detection techniques in Mobile ad hoc networks. In this research paper, we will identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks.

References
  1. Kamanshis Biswas and Md. Liakat Ali (2006), "Security threats in Mobile Ad Hoc Network". School of Engineering, Blekinge Institute of Technology, Sweden.
  2. H. Deng, W. Li, Agrawal, D. P. (2002), "Routing security in wireless ad hoc networks," Cincinnati Univ. , OH, USA; IEEE Communications Magazine, Volume: 40, page(s): 70- 75, ISSN: 0163-6804.
  3. B. Wu, J. Chen, J. Wu, M. Cardei (2006), "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering, Florida Atlantic University.
  4. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang (2004), "Security in mobile ad hoc networks: challenges and solutions," In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume- 11, Page(s): 38- 47, ISSN: 1536-128439.
  5. L. Zhou, Z. J. Haas (1999), Cornell University, New York, USA. "Securing ad hoc networks," IEEE Network, Volume: 13, Page(s): 24-30, ISSN: 0890-8044.
  6. Ching -Chuan Chiang, Hsiao-Kunag Wu, Winston Liu and Mario Gerla (1997), "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," IEEE Singapore International Conference on Networks, SICON'97, pp. 197-211.
  7. C. E. Perkins, E. Royer, and S. R. Das (2000), "Ad hoc on demand distance vector (AODV) routing," Internet Draft.
  8. Hongmei Deng, Wei Li, and Dharma P. Agrawal (2002), "Routing Security in Wireless Ad Hoc Network," IEEE Communications Magzine, vol. 40, no. 10.
  9. P. Papadimitratos and Z. Haas (2002). "Secure routing for mobile ad hoc networks" (SRP) SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 27-31.
  10. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang (2001). "Providing robust and Ubiquitous Security support for Mobile Ad Hoc Networks ", Proceedings of the 9th International conference on Network Protocols (ICNP), Riverside, California, USA.
  11. F. Stajano and R. J. Anderson (1999). "The resurrecting duckling: Security issues for ad-hoc wireless networks" In 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, Cambridge, United Kingdom. Springer-Verlag, Berlin Germany.
  12. T. Camp, J. Boleng, and V. Davies (2002). "A Survey of Mobility Models for Ad Hoc Network Research", in Wireless Communication & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5.
  13. Manel Guerrero Zapata (2002), "Secure Ad hoc On-Demand Distance Vector Routing", ACM Mobile Computing and Communications Review (MC2R), 6(3):106-107.
  14. Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends (2012) by Kamaljit Lakhtaria, Sir Padampat Singhania University, Udaipur, India.
  15. Mobile Ad Hoc Networks: From Wireless LANS to 4G Networks (2009) by George Aggelou, Tata McGraw Hill Education Private Limited, Noida, India.
  16. Security Threats in Mobile Ad Hoc Network (2007) by Kamanshis Biswas and Md. Liakat Ali, Blekinge Institute of Technology, Sweden.
  17. Secure Tracking of Node Encounters in Multi-Hop Wireless Networks (2003) by Srdjan Capkun , Levente Buttyán , Jean-Pierre Hubaux, Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland.
  18. Securing Vehicular Ad Hoc Networks (2007) by Maxim Raya and Jean-Pierre Hubaux, School of Computer and Communication Sciences, EPFL, Switzerland.
  19. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer (2002). "A Secure Routing Protocol for Ad Hoc Networks". Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
  20. Routing Security in Wireless Ad Hoc Networks (2002) by Hongmei Deng, Wei Li, and Dharma P. Agrawal, University of Cincinnati, Clifton Avenue Cincinnati, OH, United States.
  21. M. Jakobsson, S. Wetzel, and B. Yener (2004). "Stealth Attacks on Ad Hoc Wireless Networks". Proc. of IEEE Vehicular Technology Conference (VTC). IEEE 60th, Volume: 2.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Threats Denial of Service (DoS) Passive & Active Attack