Security Issues of Routing Protocols in MANETs

2012 ◽  
Vol 3 (2) ◽  
pp. 339-342
Author(s):  
Kaushal Gandhi ◽  
Rajneesh Narula ◽  
Sumeer Khullar ◽  
Anish Arora

There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.

2013 ◽  
Vol 734-737 ◽  
pp. 3203-3206
Author(s):  
Zheng Ce Cai

A mobile AD hoc network (MANETS) is a collection of mobile nodes which can dynamically form a temporary network without using any existing network infrastructure or centralized administration. Mobile ad hoc networks (MANETs) bring great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. With routing being a critical aspect for MANETs, existing routing protocols, however, are not sufficient for security requirements. Limited bandwidth and mobilityrequire that ad hoc routing protocols be robust, simple, and energy conserving. This paper firstly analyzes the routing attacks of mobile Ad hoc networking, then elaborates and compares some ad hoc secure routing protocols, at last points the future researches.


Author(s):  
Sherin Zafar ◽  
Samia Khan ◽  
Nida Iftekhar ◽  
Siddhartha Sankar Biswas

This chapter overviews and characterizes the protected steering convention in MANET, and furthermore, it discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles to different hubs, some middle hubs remove helpful data parcels and can't advance the parcel to the following hub. Some hubs may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET, which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending.


Author(s):  
JASPAL KUMAR ◽  
M. KULKARNI ◽  
DAYA GUPTA

Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This paper gives an overview of seven such secure routing protocols by presenting their characteristics and functionality along with their respective merits and drawbacks. A Comparison of these protocols is also presented based upon certain security parameters.


Sign in / Sign up

Export Citation Format

Share Document