Issues Related to Network Security Attacks in Mobile Ad Hoc Networks (MANET)

Big Data ◽  
2016 ◽  
pp. 2006-2027
Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.

Author(s):  
Rakesh Kumar Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. In this research, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack, etc.


Author(s):  
Jhum Swain

A mobile ad hoc network (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the node partake in acting as both router and host and is in charge for accelerating packets to other nodes. This chapter discusses the various attacks on different layers and on various security protocols. So, designing a secure routing protocol is a main challenge in MANET. As we all know, this is a mobile ad hoc network so nodes in the network dynamically establish paths among each other so it is vulnerable to different kinds of threats. So, in this case, we need secured communication among the nodes present in the network.


2006 ◽  
Vol 03 (03) ◽  
pp. 233-245
Author(s):  
A. SHAJIN NARGUNAM ◽  
M. P. SEBASTIAN

Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure-less networks is how to manage the cryptographic keys that are needed. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These unique characteristics of mobile ad hoc networks such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology cause a number of nontrivial challenges to security design. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non-overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.


Author(s):  
Abdelhalim Baaziz ◽  
Samuel Pierre

This chapter describes a hybrid routing protocol for mobile ad hoc network based on the packet relaying cooperation and zone-based network architecture. In each zone, a specific node called Principal manages the routing processing. The Principal receives, periodically from its zone‘s nodes, two values that express their rate of success and their rate of cooperation, and then calculates the average rate of success, and the average rate of cooperation of the zone. After what, it retransmits these averages to all nodes. The nodes use the two averages values to define the action to be undertaken, cooperate or not. The Principal, knowing the topology of its zone, receives route requests and calculates the path between the source and the destination according to the best way based on cooperation. The Principal‘s features are so that it is simple to realize. It does not impose constraints and it allows the information gathering that is necessary for the model solution. Such the routing protocol and the nodes (to undertake the actions that make them possible to cooperate) use this information. Simulations show the efficiency of the protocol opposite to the pro-active and reactive protocols in the context of cooperation in mobile ad hoc networks.


2012 ◽  
Vol 224 ◽  
pp. 520-523
Author(s):  
Hyun Jong Cha ◽  
Jin Mook Kim ◽  
Hwang Bin Ryou

A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.


2020 ◽  
Vol 1 (1) ◽  
pp. 7-14
Author(s):  
Chen Chao ◽  
Liang Jun ◽  
Sun Xin

Mobile ad hoc networks use the wireless network and have wider applications especially in emergency situation, military combat zones, and the mobility vehicles. The mobile ad hoc network especially poses the problem of security and efficiency as the network is often subject to internal and external attacks. To overcome such problems, different protocols are proposed. In this study, an improved protocol is proposed which makes use of hexacol cluster method and thus provide greater efficiency and security to the network. For validating the proposed method, a stimulation was performed and results were compared with other protocols. The results indicate that the proposed method showed improved performance compare to the other protocol.


2017 ◽  
Vol 10 (1) ◽  
pp. 82-85
Author(s):  
Vikram Agrawal

MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Author(s):  
Anuj Joshi ◽  
Pallavi Srivastava ◽  
Poonam Singh

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration. Due to this unique property, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for, security challenges has become a primary concern to provide secure communication. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have identified the challenges and proposed solutions to overcome them. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.


This research paper proposes the “mobile ad hoc networks (MANETs) need aid autonomously self-organized networks without framework backing”. For a “mobile ad hoc network, nodes move arbitrarily”; consequently that network might background fast also random topology changes.In view nodes previously, a MANET regularly have set transmission ranges, a percentage node can't correspond specifically with one another. Hence, routing path in mobile networks possibly hold numerous hops, each hub to mobile networks need the obligation on go about as a switch. This paper is an review from research work on “routing protocol for MANET, Mobile Ad Hoc Network” has as of late increased a ton of fame among computer researchers and specialists. “A MANET is an infrastructure less network” with a lot of dynamic, versatile and self-arranging hubs. Intrigue and utilization of remote versatile network have been becoming in the course of the most recent couple of years.MANETs to have a productive multicast directing and a Quality of Service (QoS) component.Multicast for Ad hoc Network with Hybrid Swarm Intelligence convention depends on swarm insight based optimization technique.


Sign in / Sign up

Export Citation Format

Share Document