Open Access   Article Go Back

An Exhaustive Survey on Security Solutions in MANETs

K.B. Kalambe1 , S.M. Apte2

  1. Department of Computer Application, Shri Ramdeobaba College of Engineering and Management Nagpur, India.
  2. Department of Computer Application, Shri Ramdeobaba College of Engineering and Management Nagpur, India.

Correspondence should be addressed to: kalambekb@rknec.edu.

Section:Survey Paper, Product Type: Journal Paper
Volume-5 , Issue-5 , Page no. 124-131, May-2017

Online published on May 30, 2017

Copyright © K.B. Kalambe, S.M. Apte . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.B. Kalambe, S.M. Apte, “An Exhaustive Survey on Security Solutions in MANETs,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.124-131, 2017.

MLA Style Citation: K.B. Kalambe, S.M. Apte "An Exhaustive Survey on Security Solutions in MANETs." International Journal of Computer Sciences and Engineering 5.5 (2017): 124-131.

APA Style Citation: K.B. Kalambe, S.M. Apte, (2017). An Exhaustive Survey on Security Solutions in MANETs. International Journal of Computer Sciences and Engineering, 5(5), 124-131.

BibTex Style Citation:
@article{Kalambe_2017,
author = {K.B. Kalambe, S.M. Apte},
title = {An Exhaustive Survey on Security Solutions in MANETs},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2017},
volume = {5},
Issue = {5},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {124-131},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1276},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1276
TI - An Exhaustive Survey on Security Solutions in MANETs
T2 - International Journal of Computer Sciences and Engineering
AU - K.B. Kalambe, S.M. Apte
PY - 2017
DA - 2017/05/30
PB - IJCSE, Indore, INDIA
SP - 124-131
IS - 5
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
777 398 downloads 484 downloads
  
  
           

Abstract

Wireless adhoc network is a self arranged wireless network comprised of large number of self controlled sensor nodes or mobile nodes. These self controlled nodes are randomly distributed in a decentralized network. These nodes connect with others node using the connectionless links. They have no information about location of other nodes. They are communicating with each other by sensing the position of every other node. They can sense within some specific transmission range. They possess the non uniform structure. Because of their non uniform structure and decentralized nature, wireless network may prone to various attacks so secure routing in wireless network is a critical task. It may consist of some trusted node or it may contain some malicious node, so it is difficult to detect whether the packet is forward to trusted or malicious nodes. So for this kind of problem several security techniques have been proposed. But a full proof protocol is yet to be discovered to handle all the attacks in an integrated manner and therefore still it is a challenge for new researchers. In this survey paper, various existing security protocol have been discussed in details. This Paper is a survey about what are the various types of attacks can occur in routing Protocol and how the security technique is followed in a particular protocol.

Key-Words / Index Term

WSN, Routing protocol, security, attacks, malicious node, packet

References

[1] R. S. Shaktawat ,D. Singh ,N. Choudhary, “An Efficient Secure Routing Protocol in MANET Security - Enhanced AODV (SE-AODV) ”, International Journal of Computer Applications, Vol.97, No.8, pp.1-12, 2014.
[2] A. K. Gupta, D. Mehrotra, “Detecting and Dealing with Malicious Nodes Problem in MANET”- International Journal of Scientific & Engineering Research, Vol.4, Issue.7, pp.61-68, 2013.
[3] A. Vijayan, T. Thomas, “Anonymity, Unlinkability and Unobservability in Mobile Ad Hoc Networks”, International Conference on Communication and Signal Processing, India pp.3-5, 2014.
[4] PK. Sharma, SL. Mewada, P. Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[5] G. Kalpana, S. Archana, "Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.133-138, 2015.
[6] M. Jamgade , V. Shukla , “Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.
[7] M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET", International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.66-70, 2016.
[8] Y. Zeng, R. Zhang, "Active eavesdropping via spoofing relay attack", 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, pp.2159-2163, 2016.
[9] X. Li, H.-N. Dai, Y. Wang, H. Wangt, “Eavesdropping Activities in Wireless Networks: Impact of Channel Randomness”, TENCON- IEEE Region 10 Conference, Macao, pp.1-4, 2015.
[10] S. Anusuya, S. Meenakshi, "An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.112-117, 2015.
[11] A. Saraf, M. Singh, "A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV", International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.130-135, 2015.
[12] K. Thamizhmaran, R. S. K. Mahto, V. S. K. Tripathi, “Performance Analysis of Secure Routing Protocols in MANET”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.1, Issue.9, pp.151-154, 2012.
[13] Usha MK, A.S. Poornima, “Node-To-Node Authentication Protocol to Prevent Black Hole Attack in AODV”, 2016 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, pp. 133-136, 2016.
[14] S.V. Baghel, D.P. Theng, "A survey for secure communication of cloud third party authenticator", 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp.51-54, 2015.
[15] R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, K. Thurber, “Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)”, MILCOM 2000 21st Century Military Communications Conference Proceedings, USA, pp.660664, 2000.
[16] UK. Singh, SL. Mewada, L. Laddhani, K. Bunkar, “An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)”, International Journal of Computer Science and Information Security, Vol.9, No.4, pp.106-111, 2011.
[17] Y.C. Hu, A. Perrig , D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, pp. 1976-1986, 2003.
[18] H. Tran, Hans-Jurgen Zepernick, “Proactive Attack: A Strategy for Legitimate Eavesdropping”, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), Ha Long, pp. 457-461, 2016.
[19] J.A.N. Sidnal, “Survey - Secure Routing Protocols of MANET”, International Journal of Applied Information Systems , Vol.5, No.4, pp.1-8, 2013.
[20] S. Mewada, UK. Singh, PK. Sharma, “Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, pp.728-732, 2012.
[21] D. Airehrour, J. Gutierrez , S.K. Ray, “GradeTrust: A Secure Trust Based Routing Protocol For MANETs”, 2015 International Telecommunication Networks and Applications Conference, Sydney, pp.65-70, 2015.
[22] S.K. Dhurandher, I. Woungang, I. Traore, “C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile AdHoc Networks”, 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, pp.530-535, 2014.
[23] UK. Singh, J. Patidar, KC. Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[24] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[25] D.D. Punwatkar, K.N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.65-69, 2014.
[26] D. Dave, P. Dave, “An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET”, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, pp. 1690-1696, 2014.