We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey of Different Attacks against Routing Protocols in Ad Hoc Environment

Published on February 2016 by Ashish Patil, Nilesh Marathe, Puja Padiya
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 1
February 2016
Authors: Ashish Patil, Nilesh Marathe, Puja Padiya
14205cb1-490a-46a4-a216-3a8b45b5e724

Ashish Patil, Nilesh Marathe, Puja Padiya . Survey of Different Attacks against Routing Protocols in Ad Hoc Environment. International Conference on Advances in Science and Technology. ICAST2015, 1 (February 2016), 1-7.

@article{
author = { Ashish Patil, Nilesh Marathe, Puja Padiya },
title = { Survey of Different Attacks against Routing Protocols in Ad Hoc Environment },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 1 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 1-7 },
numpages = 7,
url = { /proceedings/icast2015/number1/24216-3000/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Ashish Patil
%A Nilesh Marathe
%A Puja Padiya
%T Survey of Different Attacks against Routing Protocols in Ad Hoc Environment
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 1
%P 1-7
%D 2016
%I International Journal of Computer Applications
Abstract

The Wireless network is attracting users as well as researchers because of aspects like, ease of access, easy and quick to setup, and freedom from wires and cables. It is of two types, the Infrastructure-based wireless network, such as WLANs (Wireless Local Area Networks); And the Infrastructure-less wireless networks, such as Ad Hoc network. The Ad hoc network is a network which can be setup in-a-minute without any infrastructure. There are two types of ad hoc network namely, Mobile Ad-Hoc Network (MANET) and Vehicular Ad-Hoc Network (VANET). Routing in MANET is facing challenges like, Dynamic topology, low battery power. Whereas VANET has issues like, highly mobile nodes (high speed vehicles), Low communication range, periodic communication with road-side units, GPS communication for physical location of a vehicle, etc. This study focuses on routing in MANET and VANET, and found some issues and vulnerabilities in it. The attacker takes advantage of assumption of cooperativeness in Ad hoc network routing and launches an attack. As VANET inherits some of the properties of MANET, so both have some common attacks against routing. This study compares the routing protocols as well as the attacks on both MANET and VANET Scenarios.

References
  1. T. Clausen, P. Jacquet, "Optimized Link State Routing Protocol (OLSR)", RFC 3626, Oct. 2003
  2. Gupta, Kriti, Maansi Gujral, Nidhi "Secure Detection Technique Against Black hole Attack For Zone routing Protocol in MANETS," International Journal of Application or Innovation in Engineering & Management 2. 6 (2013).
  3. Gupta Rachika, "Mobile adhoc network (MANETS): Proposed solution to security related issues," Indian J. Computer Science and Engineering (IJCSE), vol. 2, no. 5, pp. 748-46, Nov 2011.
  4. Jhariya Mahendra Kumar, Piyush Kumar Shukla, Raju Barskhar. "Assessment of Different Attacks and Security Schemes in Vehicular Ad-hoc Network," International Journal of Computer Applications, vol. 98, no. 22, pp. 24-30, Jul. 2014.
  5. Kannhavong, Bounpadith, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, "A survey of routing attacks in mobile ad hoc networks," Wireless communications, IEEE, vol. 14, no. 5, pp. 85-91, Oct. 2007.
  6. Abdelaziz, Amara Korba, Mehdi Nafaa, and Ghanemi Salim. "Survey of routing attacks and countermeasures in mobile ad hoc networks," 2013 UKSim 15th International Conference on Computer Modelling and Simulation, pp. 693-698, 2013.
  7. Perkins, Belding-Royer, Das. "Ad hoc on-demand distance vector (aodv) routing," RFC 3561, Jul. 2003.
  8. Jesus Tellez, and Sherali Zeadally, "Security in Vehicular ad hoc network", Dynamic Ad Hoc Networks – IET telecommunication series 59, ch. 3. 2013.
  9. Samara, Ghassan, Wafaa AH Al-Salihy, R. Sures. "Security Analysis of Vehicular Ad Hoc Nerworks (VANET)," 2010 Second International Conference on Network Applications Protocols and Services (NETAPPS), pp. 55-60, 2010.
  10. Surmukh Singh, Sunil Agrawal. "VANET routing protocols: Issues and challenges," 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1-5, Mar. 2014.
  11. Priyanka Sirola, Amit Joshi, Kamlesh C. Purohit. "An Analytical Study of Routing Attacks in Vehicular Ad-hoc Networks (VANETs)," International Journal of Computer Science Engineering (IJCSE), vol. 3, no. 4, pp. 210-218, Jul. 2014.
  12. Sreenath, N. , A. Amuthan, and P. Selvigirija. "Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs," 2012 International Conference on Computer Communication and Informatics (ICCCI), Jan 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Network Attack Manet Routing Vanet.