Volume- 2
Issue- 4
Year- 2014
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Anshu , Suman Sagwan
Security has become a primary concern in order to provide reliable communication between mobile nodes. Inherent characteristics of Mobile ad hoc networks like open peer-to-peer network architecture, shared wireless medium, resource constraints, and dynamic network topology make them more vulnerable to security threats. This calls for elaborated security solutions that achieve both broad protection and desirable network performance. This paper identifies the security issues related to MANET, the known routing attacks and th
[1] C.S.R.Murthy and B.S.Manoj, Ad Hoc Wireless Networks, Pearson Education, 2008.
[2] George Aggelou, Mobile Ad Hoc Networks, McGraw-Hill, 2004.
[3] E. Ahmed, K. Samad, W. Mahmood, “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks,” AusCERT2006 R&D Stream Program, Information Technology Security Conference, May 2006.
[4] Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Communications, vol. 11, pp. 38-47, Feb., 2004.
[5] B.Wu, J.Chen, J.Wu, and M.Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, vol. 17, 2006.
[6] B.Kannhavong, H.Nakayama, Y.Nemoto, N.Kato, A.Jamalipour,“A Survey Of Routing Attacks In Mobile Ad Hoc Networks,” IEEE Wireless Communications, vol. 14, issue 5, pp. 85-91, October 2007.
[7] Y.C.Hu and A.Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Security and Privacy, vol. 2(3), pp. 28-39, May 2004.
[8] D. Wang, M. Hu, H. Zhi, “A Survey of Secure Routing in Ad Hoc Networks,” IEEE Ninth International Conference on Web-Age Information Management, 2008, (WAIM '08), pp.482-486, July 2008.
[9] K.Sanzgiri, D.LaFlamme, B.Dahill, B.N.Levine, C.Shields, and E.M.Belding-Royer, “Authenticated Routing for Ad Hoc Networks,” Proceedings of IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, March 2005.
[10] Y.C.Hu, A.Perrig, and D.B.Johnson, “Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks,” Proc. MobiCom’02, Atlanta, GA, pp. 12-13 September 2002.
[11] M.G.Zapata and N.Asokan, “Securing Ad-Hoc Routing Protocols,” Proceedings of ACM Workshop on Wireless Security, pp. 1– 10,September 2002.
[12] Y.C.Hu, D.B.Johnson and A.Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, pp. 3-13. June 2002.
[13] K.Sanzgiri, B.Dahill, B.N.Levine, C.Shields and E.M. Royer, “A Secure Routing Protocol for Ad hoc Networks”, Proceedings of 10th IEEE International Conference on Network Protocols (ICNP’02), IEEE Press, pp. 78-87, 2002.
[14] P.Papadimitratos, and Z.J.Haas, “Secure Link State Routing for Mobile Ad hoc Networks,” Proceedings of IEEE Workshop on Security and Assurance in Ad hoc Networks, IEEE Press, pp. 27-31, 2003.
[15] Y.C.Hu, A.Perrig and D.Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the ACM Workshop on Wireless Security (WiSe), SanDiego, California, pp. 30-40, September 2003.
[16] T.R.Andel and A.Yasinsac, “The Invisible Node Attack Revisited,” Proceedings of IEEE SoutheastCon 2007, pp. 686 – 691, March 2007.
[17] M.Drozda, H.Szczerbicka., “Artificial Immune Systems: Survey and Applications in Ad Hoc Wireless Networks,” Proceedings of International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'06), Calgary, Canada, pp. 485- 492, 2006.
[18] X.Lin, R.Lu, H.Zhu, P.H.Ho, X.Shen and Z.Cao, “ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks,” IEEE International Conference on Communications, ICC '07, pp. 1247 – 1253, June 2007.
[19] L. Zhou and Z.J. Haas, “Securing Ad hoc Networks,” IEEE Network Magazine, vol. 6, no. 13, pp. 24-30, November/December 1999.
[20] B. Kannhavong, H. Nakayama, N.Kato, Y.Nemoto and A.Jamalipour, “Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks,” Proceedings of the Seventh IEEE International Symposium on Computer Networks (ISCN' 06), pp. 30-35, June 2006.
[21] P.Yi, Z.Dai, S.Zhang, Y.Zhong., “A New Routing Attack In Mobile Ad Hoc Networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 83-94, 2005.
[22] S.Desilva, and R.V.Boppana, “Mitigating Malicious Control Packet Floods In Ad Hoc Networks,” Proceedings of IEEE Wireless Communications and Networking Conference 2005, , vol. -4, pp. 2112- 2117, March 2005.
[23] Y.Guo, S.Gordon, S.Perreau, “A Flow Based Detection Mechanism Against Flooding Attacks In Mobile Ad Hoc Networks,” Wireless Communications and Networking Conference, IEEE (WCNC 2007), pp.3105-3110, March 2007.
[24] T.Peng, C.Leckie, R.Kotagiri, “Proactively Detecting Distributed Denial Of Service Attacks Using Source IP Address Monitoring,”Proceedings of IFIP-TC6, 782 Athens, Greece, pp. 771- 782, May 2004.
[25] V.Balakrishnan, V.Varadharajan, U.K.Tupakula, “Fellowship: Defense Against Flooding And Packet Drop Attacks In MANET,” Network Operations and Management Symposium, NOMS 2006, pp. 1- 4, 2006.
[26] L.Tamilselvan, V.Sankaranarayanan, “Prevention of Blackhole Attack in MANET,” The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless, pp. 21- 26, August 2007
[27] S.Lee, B.Han, and M.Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 International. Conference on Parallel Processing Workshop, Vancouver, Canada, pp. 73-78, August 2002.
[28] M.A.Shurman, S.M.Yoo, and S.Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM Southeast Regional Conference, pp. 96-97, 2004.
[29] S.Kurosawa, H.Nakayama, N.Kato, A.Jamalipour, and Y.Nemoto, “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” International Journal of Network Security, vol. 5, no. 3, pp. 338-346, November 2007.
[30] D.Dhillon, J.Zhu, J.Richards and T.Randhawa, “Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs,” Proceedings Of The 2006 International Conference On Wireless Communications And Mobile Computing, pp. 45-50, 2006.
[31] Y.C.Hu, A.Perrig, and D.Johnson, “Wormhole Attacks in Wireless Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, February 2006.
[32] L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path,” IEEE Wireless Communication and Networking Conference ’05, vol. 4, pp.2106-2111, March 2005.
[33] X.Su, R.V.Boppana, “On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks,” IEEE International Conference on Communications, ICC '07, pp. 1136-1141, June 2007.
[34] M.A.Gorlatova, P.C.Mason, M.Wang, L.Lamont, R. Liscano, “Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis,” Military Communications Conference, MILCOM 2006, pp. 1-7, October 2006
[35] Y.Sun, Z.Han and K.J.R.Liu, “Defense of trust management vulnerabilities in distributed networks,” IEEE Communications Magazine, vol. 46, issue 2, pp.112-119, February 2008.
[36] V.Balakrishnan, V.Varadharajan, U.K.Tupakula and P.Lucs, “TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks,” 15th IEEE International Conference on Networks, ICON 2007, pp. 182-187, November 2007.
[37] V.Balakrishnan, V.Varadharajan, U.K.Tupakula and P.Lucs, “Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks,” 4th International Symposium on Wireless Communication Systems, ISWCS 2007, pp. 592-596, October 2007
Computer Science & Engineering , Deen Bandhu Chotu Ram University, Sonepat, India, +91-9991666556, (mca706@gamil.com)
No. of Downloads: 14 | No. of Views: 2064
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3
Venkateswaran Radhakrishnan.
May 2023 - Vol 11, Issue 3
Heemakshi Sharma, Khushboo Tripathi.
May 2023 - Vol 11, Issue 3