CFP last date
20 January 2025
Reseach Article

A Review of �MANET�s Security Aspects and Challenges�

Published on None 2010 by Pradeep Rai, Shubha Singh
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 4
None 2010
Authors: Pradeep Rai, Shubha Singh
e449c793-110b-4471-94d2-56682e232db3

Pradeep Rai, Shubha Singh . A Review of �MANET�s Security Aspects and Challenges�. Mobile Ad-hoc Networks. MANETS, 4 (None 2010), 162-166.

@article{
author = { Pradeep Rai, Shubha Singh },
title = { A Review of �MANET�s Security Aspects and Challenges� },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 4 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 162-166 },
numpages = 5,
url = { /specialissues/manets/number4/1038-89/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Pradeep Rai
%A Shubha Singh
%T A Review of �MANET�s Security Aspects and Challenges�
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 4
%P 162-166
%D 2010
%I International Journal of Computer Applications
Abstract

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like openpeer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quicklyspreading for the property of its capability in forming temporary network without the aidof any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identifythe existent security threats an ad hoc network faces. To accomplish our goal, wehave done literature survey in gathering information related to various types of attacks and solutions. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. However, inshort, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

References
  1. Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147.
  2. Data Integrity, from Wikipedia, the free encyclopedia,http://en.wikipedia.org/wiki/Data_integrity.
  3. P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002.
  4. Y. Hu, A. Perrig and D. Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks, in Proceedings of ACM MOBICOM’02, 2002.
  5. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks, in Proceedings of ICNP’02, 2002.
  6. Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Ad Hoc Networks, 1 (1): 175–192, July 2003.
  7. Y. Hu, A. Perrig and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in Proceedings of IEEE INFOCOM’03, 2003.
  8. C.Tseng, P.Balasubramanyam,C. Ko, R.Limprasittiporn, J.Rowe, and K.Levitt, “A Specification-based Intrusion Detection System for AODV”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks(SASN03), Fairfax, VA, USA, pp. 125–134, 2003.
  9. Y.Huang and W.Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN03), Fairfax, VA, USA, pp. 135-147, 2003.
  10. M.Kefayati, H.R.Rabiee, S. G.Miremadi, and A.Khonsari, “Misbehavior Resilient Multi-path Data Transmission in Mobile Ad-hoc Networks”, in Proceedings of the FourthACM Workshop on Security of Ad Hoc and Sensor Networks (SASN06) Alexandria, VA, USA, pp. 91-100, 2006.
  11. Y.Xue and K.Nahrstedt, “Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments”, Wireless Personal Communication, vol. 29, issue 3-4, pp. 367-388, 2004.
  12. L.Anderegg and S.Eidenbenz, “Ad hoc-VCG: A Truthful and Cost-efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents”, in Proceedings of the 9th
  13. Annual international Conference on Mobile Computing and Networking (MOBICOM03), San Diego, CA, USA, pp. 245-259, 2003. Glomosim 2.03,http://pcl.cs.ucla.edu/projects/glomosim/.
  14. J. Parker, A. Patwardhan and A. Joshi, “Cross-layer Analysis for Detecting Wireless Misbehavior”, in Proceedings of the IEEE Consumer ommunications and NetworkingConference(CCNC 2006), Las Vegas, Nevada, USA, Jan. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Aspects watchdog IDS Clusters Agents PathRater