Security Challenges and Attacks in Mobile Ad Hoc Networks

Full Text (PDF, 203KB), PP.49-58

Views: 0 Downloads: 0

Author(s)

CH. V. Raghavendran 1,* G. Naga Satish 1 P. Suresh Varma 2

1. Ideal College of Arts & Sciences, Kakinada, Andhra Pradesh, India

2. Adikavi Nannaya University, Rajahmundry, Andhra Pradesh, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2013.03.06

Received: 14 Jun. 2013 / Revised: 20 Jul. 2013 / Accepted: 12 Aug. 2013 / Published: 8 Sep. 2013

Index Terms

MANETs, Security, Passive Attacks, Active Attacks, Network Layers

Abstract

Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

Cite This Paper

CH.V. Raghavendran, G. Naga Satish, P. Suresh Varma, "Security Challenges and Attacks in Mobile Ad Hoc Networks", International Journal of Information Engineering and Electronic Business(IJIEEB), vol.5, no.3, pp.49-58, 2013. DOI:10.5815/ijieeb.2013.03.06

Reference

[1]Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia Zhanng, “Security on Mobile Ad Hoc Networks: Challenges and Solutions” 1536-1284/04/IEEE Wireless Communica-tions Feb, ‘04. 

[2]Zhou, L and Haas Z. J., “Securing Ad Hoc Networks” IEEE Network Magazine, 13(6), 1999, pp. 24-30.

[3]Nishu Garg and R.P. Mahapatra, “MANET Security Issues”. In IJCSNS International Journal of Computer Science and Network Security, 9, No.8, August 2009.

[4]Arun Kumar Bayya, Siddhartha Gupte, Yogesh Kumar Shukla, Anil Garikapati. “Security in Ad-hoc Networks”. Computer Science Department University of Kentucky.

[5]Sanzgiri K, Dahill B, Levine B.N and Belding-Royer E.M, “A secure routing protocol for Ad-hoc networks,” Proc. Of IEEE ICNP, 2002.

[6]Er. Tushar Gohil “Overview of Security Threats in Mobile Ad-hoc Network”, Journal of High Performance Communication Systems and Networking Volume. 2 (1-2), January-December 2010, pp. 1–10.

[7]A. Burg. “Ad hoc network specific attacks”. In Seminar Ad Hoc networking: Concepts, Applications and Security. Technische University Munchen, 2003.

[8]S. Bouam and J. B. Othman, “Data Security in Ad hoc Networks using MultiPath Routing,” in Proc. of the 14th IEEE PIMRC, pp. 1331-1335, Sept. 7-10, 2003. 

[9]G. Schäfer, “Research Challenge in Security for Next Generation Mobile Networks,” Position Papers PAMPAS '02 - Workshop on Requirements for Mobile Privacy & Security, Sept. 16-17, 2002. 

[10]B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, Florida Atlantic University, http://student.fau.edu/jchen8/web/papers /SurveyBookchapter.pdf

[11]W. Stallings, Wireless Communication and Networks, Pearson Education, 2002.

[12]N. Borisov, I. Goldberg and D.Wagner, Interception Mobile Communications: The Insecurity of 802.11. Conference of Mobile Computing and Networking, 2001.

[13]T. Karygiannis and L. Owens, Wireless Network Security-802.11, Bluetooth and Handheld Devices. National Institute of Standards and Technology. Technology Administration, U.S Department of Commerce, Special Publication 800-848, 2002.

[14]Y.C.Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.

[15]B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security, pp.21-30, ‘02.

[16]Pradip M. Jawandhiya et. al. “A Survey of Mobile Ad Hoc Network Attacks” International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4063-4071.

[17]H. Deng, W. Li, Agrawal, D.P., “Routing security in wireless ad hoc networks,” Cincinnati Univ., OH, USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804.

[18]J.-F. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” Proc. Wksp. Design Issues in Anonymity and Unobservability, Berkeley, CA, July ‘00, pp. 7–26.

[19]K. Sanzgiri et al., “A Secure Routing Protocol for Ad hoc Networks,” Proc. 10th IEEE Int’l. Conf. Network Protocols (ICNP’02), 2002, pp. 78–87.

[20]Chris Karlof, David Wagner: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures http://citeseer.nj.nec.com /576488.html.