We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Survey of Malicious Attacks in MANET

by Neha Shrivastava, Anand Motwani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 14
Year of Publication: 2013
Authors: Neha Shrivastava, Anand Motwani
10.5120/13931-1916

Neha Shrivastava, Anand Motwani . Survey of Malicious Attacks in MANET. International Journal of Computer Applications. 80, 14 ( October 2013), 28-30. DOI=10.5120/13931-1916

@article{ 10.5120/13931-1916,
author = { Neha Shrivastava, Anand Motwani },
title = { Survey of Malicious Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number14/13931-1916/ },
doi = { 10.5120/13931-1916 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:34.110594+05:30
%A Neha Shrivastava
%A Anand Motwani
%T Survey of Malicious Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 14
%P 28-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many threats in wireless Mobile Ad hoc Networks. MANETs suffers from intrusion in which a malicious node may or may not participate in route discovery mechanism with an intension to degrade the overall network performance. Intrusion has serious impact on routing and delivery ratio of packets. Many researchers have conducted different techniques to propose different types of detection and prevention schemes. Here various attacks types and a survey of the existing solutions is presented.

References
  1. Hizbullah Khattak, Nizamuddin, Fahad Khurshid, Noor ul Amin, " Preventing Black and Gray Hole Attacks in AODV using Optimal Path Routing and Hash",(645-648) 978-1-4673-5200-0/13/2013 IEEE.
  2. G. Indirani, Dr. K. Selvakumar, V. Sivagamasundari, "Intrusion Detection and Defense Mechanism for Packet Replication Attack over MANET Using Swarm Intelligence", (152-156) Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 978-1-4673-5845-3/13/2013 IEEE.
  3. P. Karthikkannan, K. P. Lavanya Priya," Reduction of Delays in Reactive Routing Protocol for Unobservable Mobile Ad-Hoc Networks", 2013 IEEE.
  4. Sanjay K. Dhurandher, Isaac Woungang, Raveena Mathur , Prashant Khurana," GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs",(357-362) 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 978-0-7695-4952-1/13/2013 IEEE.
  5. Yudhvir Singh, Avni Khatkar, Prabha Rani, Deepika, Dheer Dhwaj Barak ,"Wormhole Attack Avoidance Technique in Mobile Adhoc Networks",(283-287) 2013 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/13/ 2013 IEEE
  6. Sapna Gambhir and Saurabh Sharma," PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs", (335-340) 2012 3rd IEEE International Advance Computing Conference (IACC), 978-1-4673-4529-3/12/ 2012 IEEE.
  7. Rutvij H. Jhaveri, "MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs ", (254-260)2012 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/12 / 2012 IEEE.
  8. Roopal Lakhwani , Vikram Jain , Anand Motwani , " Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks", International Journal of Computer Applications (0975 – 8887) Volume 59– No. 8, December 2012.
  9. Pramod Kumar Singh, Govind Sharma," An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET",(902-906) 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 978-0-7695-4745-9/12/ 2012 IEEE.
  10. Mohammed Saeed Alkatheiri, Jianwei Liu, Abdur Rashid Sangi, " AODV Routing Protocol Under Several Routing Attacks in MANETs" ,2011 IEEE, 978-1-61284-307-0/11.
  11. Htoo Maung Nyo, Piboonlit Viriyaphol, " Detecting and Eliminating Black Hole in AODV Routing", 2011 IEEE, 978-1-4244-6252-0/11
  12. S. Kurosawa, H. Nakayama, N. Kat, A. Jamalipour, and Y. Nemoto, "Detecting Blackhole Attack on AODV based Mobile Ad Hoc Networks by Dynamic Learning Method", International Journal of Network Security,Vo1. 5, No. 3, P. P 338-346, Nov. 2007
  13. Al-Shurman, M. Yoo, S. Park, "Black hole attack in Mobile Ad Hoc Networks", in Proc. ACM Southeast Regional Conference, pp. 96-97, 2004.
  14. Zhou L, Chao H-C, "Multimedia Traffic Security Architecture for the Internet of Things" IEEE Network 25(3):29–34. IEEE 2011.
  15. 8. Yang H, Lou H, Ye F, Lu S, Zhang L (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1):38–47.
  16. Umang S, Reddy BVR, Hoda MN, "Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols using Minimal Energy Consumption", IET Communications 4(17):2084–2094. 2010.
  17. Wu B, Chen J, Wu J, Cardei M, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks" In: Xiao Y,Shen X, Du D-Z (eds) Wireless Network Security. on Signals and Communication Technology. Springer, New York 2007.
  18. Marti S, Giuli TJ, Lai K, Baker M, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks" 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, August 2000.
  19. Tseng Y-C, Jiang J-R, Lee J-H, "Secure Bootstrapping and Routing in an IPv6-based Ad Hoc Network", Journal of Internet Technology 5(2):123–130, 2004.
  20. Hu Y-C, Perrig A, Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3):28–39, IEEE 2004.
  21. Raja Mahmood RA, Khan AI, "A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks, International Symposium on High Capacity Optical Networks and Enabling Technologies, Dubai, United Arab Emirates, November 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network MANET Security Black hole attack Gray hole attack Worm hole attack.