scholarly journals A REVIEW PAPER ON SECURITY IN MOBILE ADHOC NETWORK

2017 ◽  
Author(s):  
Anuj Mehta

Mobile Ad-hoc network (MANET) is a collection of self configuring, multi-hop wireless network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is more vulnerable to different types of attacks and security threats because of its characteristics. A routing protocol in a mobile Ad hoc network should be against both inside and outside attackers. Most of the routing protocols in MANETs assume that all the nodes in a network will cooperate to each other while forwarding data packets to other nodes. But intermediate nodes may cause several problems like it can deny to forward the packet, can also extract useful information from the packet or may modify the content of packet. Such nodes are referred as malicious nodes. We present a survey of the main types of routing protocols and some security threats and various detection scheme against attack.. This paper also classifies several common attacks against the ad-hoc networks routing protocols based upon the techniques that could be used by attackers to exploit routing messages.

Author(s):  
Zhiyan A. Younis ◽  
Adnan Mohsin Abdulazeez ◽  
Subhi R. M. Zeebaree ◽  
Rizgar Ramadhan Zebari ◽  
Diyar Qader Zeebaree

Disasters could cause communication systems partially or completely down. In such a case, relief operations need a rapidly deployed communication system to save lives. Exchanging information among the rescue team is a vital factor to make important decisions. Communication system required to be robust to failures, rapidly deployable, easily maintainable to provide better services. Wireless ad-hoc networks could be the choice of establishing communication with the aid of existing infrastructure in a post-disaster case. In order to optimize mobile ad-hoc network performance, address the challenges that could lead to unreliable performance is required. One and most crucial key challenge is routing information from a sender to receiver. Due to the characteristics of a disaster environment such as signal attenuation, communication links exist between rescue crew is short-lived, suffer from frequent route breakage, and may result in unreliable end-to-end services. Many routing protocols have been proposed and evaluated in different network environments. This paper presents the basic taxonomy of Mobile Ad Hoc Networks and the state of the art in routing categorizes (Proactive, Reactive, Geographic-aware and Delay tolerant Networks (DTN)). The comparison of existing routing protocols in Mobile Ad-Hoc Networks indicates that overhead in Proactive and Geographic is competitive with delay in Reactive and DTN routing.


2015 ◽  
Vol 9 (1and2) ◽  
Author(s):  
Hoshiyar Singh Kanyal ◽  
Prof. (Dr.) S. Rahamatkar ◽  
Dr. B. K. Sharma

Since there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose punishment as well. It is very difficult to design once-for-all intrusion detection techniques. Instead, an incremental enhancement strategy may be more feasible. A secure protocol should at least include mechanisms against known attack types. In addition, it should provide a scheme to easily add new security features in the future. Due to the importance of MANET routing protocols, we focus on the detection of attacks targeted at MANET routing protocols This include WatchDog and Pathrater approach. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A path rater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defined at the source node. This routing information is passed together with the message through intermediate nodes until it reaches the destination.


Author(s):  
A. S. M. Muntaheen ◽  
Milton Chandro Bhowmick ◽  
Md. Raqibul Hasan Rumman ◽  
Nayeem Al-Tamzid Bhuiyan ◽  
Md. Taslim Mahmud Bhuyain ◽  
...  

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any pre-established fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.


2017 ◽  
Vol 10 (3) ◽  
pp. 593-596
Author(s):  
Jitendra Soni ◽  
Kokila Uikey

Mobile ad-hoc Network [MANET] is the collection of mobile nodes deployed with the short-lived purpose. It is the most innovative and useful variety which provide the facility to establish communication without the prerequisite of any infrastructure. Here, wireless communication medium is usually used for communication and connection establishment purpose. Generally, it is deployed with mobile nodes but can be used for stationary design also. Open nature communication makes it vulnerable for several security threats. This paper has considered the simulation of AODV and ODMRP using Qualnet 5.2 simulator.


2018 ◽  
Vol 7 (3) ◽  
pp. 1453 ◽  
Author(s):  
Shibu K.R ◽  
Suji Pramila R

Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.  


2017 ◽  
Author(s):  
Isha Bhan

Mobile ad-hoc networks (MANET) are a primary requirement for the establishment of communication. CBDS has a reverse tracking mechanism which checks all the stated issues. CBDS outperforms among nodes. The malicious nodes may lead to security concerns such as it may disrupt the routing process. Since it is a Manet, it can change its scale anytime so preventing or detecting the malicious node becomes a challenge. This paper tries to solve the issue by applying a dynamic source route mechanism which is also referred as cooperative bait detection scheme (CBDS). CBDS technique integrates the advantage of both proactive and reactive mechanisms much better than the previous mechanisms like BFTR, 2ACK.


2020 ◽  
Vol 8 (6) ◽  
pp. 5580-5585

Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Due to the mobility of the nodes in the network, these nodes are self-organizing and self-configuring. Not only they act as hosts, but also, they function as routers. In MANETs, routing protocols are necessary to find specific paths between the source and the destination. The primary goal of any ad-hoc network routing protocol is to meet the challenges of the dynamically changing topology. Therefore, an efficient route between any two nodes with minimum routing overhead and bandwidth consumption should be established. The design of these routing protocols is challenging due to the mobility and the dynamic nature of the mobile ad-hoc networks. MANET routing protocols are categorized into two types: proactive and reactive. In this paper, the MANET characteristics and challenges are highlighted. Moreover, a comparison is conducted between three protocols: namely, DSDV, DSR and AODV in terms of both properties and performance.


2017 ◽  
Author(s):  
Sarvesh S. Joshi

Wireless networks are computer networks that are not connected by cables of any kind. The use of wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. Wireless networks are susceptible to many attacks. One such specific attack is a black hole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. Mobile Ad-hoc Networks (MANET) are used for communication among Mobiles and roadside equipment’s. MANET, is a form of Mobile ad-hoc network, to provide communications among nearby Mobiles and between Mobiles and nearby fixed equipment, usually described as roadside equipment. Each Mobile equipped with MANET device will be a node in the Ad-Hoc network and can receive and relay others messages through the wireless network This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Proposed system helps us in defending against the black hole attack without any requirement of hardware and special detection node.


Author(s):  
Soumya S. ◽  
Krishna Prasad K. ◽  
Navin N. Bappalige

Mobile Ad Hoc networks is a network in which energy is a main constraint and selection of a protocol that minimizes the energy usage is a key issue. Mobile Ad hoc network communicates with other nodes, without the help of base station and Communication is possible by forwarding a data unit consisting of control information and user data known as packets from one node to other. Furthermore, another key issue in mobile ad hoc networks is routing since the nodes are in mobility and tend to change the paths and move out of the network. The evaluation of energy efficient routing protocols can be effectively performed using NS3. Three types of routing protocols can be seen, Reactive, Proactive and Hybrid and in this paper, AODV a reactive protocol and OLSR a proactive protocol is compared and Delivery ratio of packets, Packet Loss and count of packets received are evaluated to analyze the energy efficiency of protocols based on these metrics.


Author(s):  
Saivikas reddy Bedudhuri

Mobile ad hoc network is a type of ad hoc wireless networks which has become highly important in wireless communication. This network has composed of a set of wireless nodes and mobile phones and computer can play role of these nodes. Routing in these networks is complex and difficult because there is no fixed topology and nodes are freely displaced. In these networks, each node plays role of a router. Military networks, crime management networks etc. can be among the examples of mobile ad hoc network. One of the most important issues in ad hoc networks is routing. There are different types of routing protocols such as AODV and DSDV routing protocols. This report analyses and evaluates these two protocols with fuzzy logic and NS-2 simulator. This report is organized as follows: previous works, relates to concepts mentioned in this paper, the designed fuzzy system, results of simulation are mentioned.


Sign in / Sign up

Export Citation Format

Share Document