Open Access   Article Go Back

Survey Paper on Various Security Attacks In Mobile Ad Hoc Network

M. Selladevi1 , S. Duraisamy2

  1. PG and Research Department of Computer Science,Chikkanna Govt Arts College Tiruppur, Tamil Nadu, India.
  2. PG and Research Department of Computer Science,Chikkanna Govt Arts College Tiruppur, Tamil Nadu, India.

Correspondence should be addressed to: mschella30@gmail.com.

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 156-160, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.156160

Online published on Jan 31, 2018

Copyright © M. Selladevi, S. Duraisamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Selladevi, S. Duraisamy, “Survey Paper on Various Security Attacks In Mobile Ad Hoc Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.156-160, 2018.

MLA Style Citation: M. Selladevi, S. Duraisamy "Survey Paper on Various Security Attacks In Mobile Ad Hoc Network." International Journal of Computer Sciences and Engineering 6.1 (2018): 156-160.

APA Style Citation: M. Selladevi, S. Duraisamy, (2018). Survey Paper on Various Security Attacks In Mobile Ad Hoc Network. International Journal of Computer Sciences and Engineering, 6(1), 156-160.

BibTex Style Citation:
@article{Selladevi_2018,
author = {M. Selladevi, S. Duraisamy},
title = {Survey Paper on Various Security Attacks In Mobile Ad Hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {156-160},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1651},
doi = {https://doi.org/10.26438/ijcse/v6i1.156160}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.156160}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1651
TI - Survey Paper on Various Security Attacks In Mobile Ad Hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - M. Selladevi, S. Duraisamy
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 156-160
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
898 385 downloads 266 downloads
  
  
           

Abstract

Mobile Ad-Hoc Network is a self-configured collection of cellular nodes in which there is no need of predefined infrastructure. In this network nodes can arbitrarily alternate their geographic places. MANET is more vulnerable to cyber-attacks than wired networks because of no any central coordination mechanism. Because of their dynamic topology, no infrastructure and no central management system MANETs are liable to various security attacks. In this paper we have proposed a solution to detect and prevent multiple attacks in a network and find a secure way to transfer data from source to destination node. This article briefly discusses about the concept of Mobile Ad Hoc Network (MANET) and its various types of attack and methods to solve the MANET attacks.

Key-Words / Index Term

Ad-hoc network, Infrastructure less network , Dynamic topology, Security attacks

References

[1] J.H.Schiller,Mobile communications ,Pearson Education,2003
[2] Nguyen, H.L.; Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 61,32–46(2008)
[3] Panaousis, E.A.; Politis, C.: Securing ad hoc networks in extreme emergency cases. In: Proceedings of the World Wireless Research Forum, Paris (2009).
[4]Anil Lamba1, SohanGarg2, Rajeev Kumar3, A Literature Review of MANET’s Routing Protocols Along With Security Issues, 2016 IJSRSET | Volume 2 | Issue 6 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099.
[5] Anurag Gupta, Kamlesh Rana, “Assessment of Various Attacks on AODV in Malicious Environment” 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015) Dehradun, India, 4-5 September 2015.
[6] Payal N. Raj, Prashant B. Swadas” DPRAODV: A Dyanamic Learning System Against Blackhole Attack in AODV Based Manet.” International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Printed): 1694-0814.
[7] Vani A. Hiremani, Manisha Madhukar Jadhao, “Eliminating Co-operative Black hole and Gray hole Attacks Using Modified EDRI Table in MANET” IEEE ,2013.
[8] Durgesh Kshirsagar, Ashwini Patil, “Black hole Attack Detection and Prevention by Real Time Monitoring” Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on 12-14 Dec. 2013
[9]Parvinder Kaur1. Dalveer Kaur2. Rajiv Mahajan3.Wormhole Attack Detection Technique in Mobile Ad Hoc Networks,Wireless Personal Communications November 2017, Volume 97, Issue 2, pp 2939–2950.
[10] Nirbhay Chaubey, Akshai Aggarwal, Savita Gandhi, Keyurbhai A Jani, “Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size” 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[11] Zahra Hosseini1. Zeinab Movahedi2.A Trust-Distortion Resistant Trust Management Scheme on Mobile Ad Hoc Networks. Wireless Personal Communications October 2017, Volume 96, Issue 4, pp 5167–5183
[12] Neeraj Arya, Upendra singh, Sushma singh, “Detecting and Avoiding of Worm Hole Attack and Collaborative Black hole attack on MANET using Trusted AODV Routing Algorithm” IEEE International Conference on Computer, Communication and Control (IC4-2015).
[13] K. Geetha1 . N. Sreenath2.Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol, Arabian Journal for Science and Engineering March 2016, Volume 41, Issue 3, pp 1161–1172.
[14] Seryvuth Tan, Keecheon Kim, “Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs” 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[15] Jian-Hua Song, Fan Hong and Yu Zhang, “Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks”, Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, pages 497-50.
[16] Opinder Singh1, Jatinder Singh. Ravinder Singh, Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET, Cluster Computing ,pp 1–13
[17]Geetika Sharma1, Anupam Mittal2, Ruchi Aggarwal3,” Attacks on Ad hoc On-Demand Distance Vector Routing in MANET International Research Journal of Engineering and Technology (IRJET) e-ISSN: Volume: 03 Issue: 06 | June-2016.
[18]Sushma Kushwaha1, Prof. Vijay Lokhande2,Security in Wireless Mobile Ad-Hoc Network Nodes Using Novel Intrusion Detection System, DOI 10.4010/2016.777,ISSN 2321 3361 © 2016 IJESC
[19] Sachin D. Ubarhande. Dharmpal D. Doye. Prakash S. Nalwade. A Secure Path Selection Scheme for Mobile Ad Hoc Network. Wireless Personal Communications, Volume 97, Issue 2, pp 2087–2096
[20] Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In ACM Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265.