Substantiation of Vulnerabilities in Various Secure Routing Protocols of MANET

Author(s):  
Sherin Zafar ◽  
Samia Khan ◽  
Nida Iftekhar ◽  
Siddhartha Sankar Biswas

This chapter overviews and characterizes the protected steering convention in MANET, and furthermore, it discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles to different hubs, some middle hubs remove helpful data parcels and can't advance the parcel to the following hub. Some hubs may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET, which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending.

2012 ◽  
Vol 3 (2) ◽  
pp. 339-342
Author(s):  
Kaushal Gandhi ◽  
Rajneesh Narula ◽  
Sumeer Khullar ◽  
Anish Arora

There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.


Author(s):  
S. Ashok Kumar ◽  
E. Suresh Babu ◽  
C. Nagaraju ◽  
A. Peda Gopi

<div><table cellspacing="0" cellpadding="0" align="left"><tbody><tr><td align="left" valign="top"><p>Over the last decade, researchers had  proposed numerous  mobile ad hoc routing protocols for which are operate in an on-demand way, as standard on-demand routing protocols such as AODV, DSR and TORA, etc., have been shown to often have faster reaction time and  lower overhead than proactive protocols. However, the openness of the routing environment and the absence of centralized system and infrastructure make them exposed to security attacks in large extent.  In particular, one such kind of attacks is rushing attack, which is mostly hard to detect due to their inherited properties, that alters the network statistics radically. In this paper, we modeled a rushing attack which is a powerful attack that exploits the weaknesses of the secure routing protocols. Moreover, to know the weakness and strength of these protocols, it is necessary to test their performance in hostile environments. Subsequently, the performance is measured with the various metrics, some ot them are average throughput, packet delivery ratio, average end-to-end delay and etc., to compare and evaluate their performance.</p></td></tr></tbody></table></div>


Author(s):  
JASPAL KUMAR ◽  
M. KULKARNI ◽  
DAYA GUPTA

Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This paper gives an overview of seven such secure routing protocols by presenting their characteristics and functionality along with their respective merits and drawbacks. A Comparison of these protocols is also presented based upon certain security parameters.


Sign in / Sign up

Export Citation Format

Share Document