Open Access   Article Go Back

MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques

Kewal Vora1 , Jugal Shah2 , Shreyas Parmar3 , Shivani Bhattacharjee4

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 26-31, Oct-2015

Online published on Oct 31, 2015

Copyright © Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee, “MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.26-31, 2015.

MLA Style Citation: Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee "MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques." International Journal of Computer Sciences and Engineering 3.10 (2015): 26-31.

APA Style Citation: Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee, (2015). MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques. International Journal of Computer Sciences and Engineering, 3(10), 26-31.

BibTex Style Citation:
@article{Vora_2015,
author = {Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee},
title = {MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {26-31},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=698},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=698
TI - MANETs: Overview of Vulnerabilities, Security Threats and Prevention and Detection Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Kewal Vora, Jugal Shah, Shreyas Parmar , Shivani Bhattacharjee
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 26-31
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2701 2549 downloads 2371 downloads
  
  
           

Abstract

Mobile Ad Hoc Network (MANET), because of its decentralized architecture, dynamic topologies and also due to rapid advancement of wireless devices has become a popular area of research. Though the self-configuring characteristic of Ad Hoc network finds application in various domains, they are exposed to vulnerabilities by malicious attackers which might compromise the entire network and reduce the overall performance of the network. These threats need to be dealt; giving rise to various solutions that would not only maintain the network efficiency but also ensure a successful data transmission along with high level of security. Such solution would require detailed information about the vulnerabilities and different type of attacks which would then lead to computing different detection and prevention mechanisms. This paper gives an overview of vulnerabilities of MANETs, different types of threats and discusses various detection and prevention mechanisms against them.

Key-Words / Index Term

MANET, ad hoc security, vulnerabilities, prevention, detection

References

[1] Mohammad Ilyas, “The Handbook of Ad Hoc Wireless Networks” Text Book.
[2] Amitabh Mishra, “Security and Quality of Service in ad hoc wireless networks” (chapter 1, 3), ISBN- 13 978-0-521-87824-1 Handbook
[3] Sukla Banerjee , “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
[4] Gangotri A Khiratkar and Swati S Mahajan, "Performance Analysis of Cluster Based Routing Protocol for Ad hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (141-143), Apr -2014, E-ISSN: 2347-2693
[5] Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S.Ali, Prof. J.S. Deshpande, “A Survey of Mobile Ad Hoc Network Attacks ”, International Journal of Engineering Science and Technology, Vol. 2(9), 2010, 4063-4071
[6] Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693
[7] Y.C. Hu, A. Perrig, and D.B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proc. 2003 ACM Workshop on Wireless Security (WiSe 2003), ACM Press, 2003, pp. 30–40.
[8] D.Anitha and Dr.M.Punithavalli : A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS. In IJCSMC, Vol. 2, Issue. 3, March 2013.
[9] S.Madhavi and Dr. Tai Hoon Kim: An Intrusion Detection System in Mobile Ad Hoc Networks. In International Journal of Security and Its Applications Vol. 2, No.3, July, 2008.
[10] Ali EI-Mousl and Ashraf Suyyagh: Ad Hoc Networks Security Challenges. In 7th International Multi-Conference on Systems, Signals and Devices, 2010.