MANET Expansion Security Challenges Attacks and Intriguing future Trends
Swati Agarwal1 , Rupinder Kaur2 , Tushar Agarwal3
- Dept. of CSE, Jayoti Vidyapeeth Women’s University, Jaipur, Rajasthan, India.
- Dept. of CSE, Jayoti Vidyapeeth Women’s University, Jaipur, Rajasthan, India.
- Dept. of ECE, the NorthCap University, Gurgaon, Haryana, India.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-5 , Page no. 906-915, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.906915
Online published on May 31, 2018
Copyright © Swati Agarwal, Rupinder Kaur, Tushar Agarwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Swati Agarwal, Rupinder Kaur, Tushar Agarwal, “MANET Expansion Security Challenges Attacks and Intriguing future Trends,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.906-915, 2018.
MLA Style Citation: Swati Agarwal, Rupinder Kaur, Tushar Agarwal "MANET Expansion Security Challenges Attacks and Intriguing future Trends." International Journal of Computer Sciences and Engineering 6.5 (2018): 906-915.
APA Style Citation: Swati Agarwal, Rupinder Kaur, Tushar Agarwal, (2018). MANET Expansion Security Challenges Attacks and Intriguing future Trends. International Journal of Computer Sciences and Engineering, 6(5), 906-915.
BibTex Style Citation:
@article{Agarwal_2018,
author = {Swati Agarwal, Rupinder Kaur, Tushar Agarwal},
title = {MANET Expansion Security Challenges Attacks and Intriguing future Trends},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {906-915},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2086},
doi = {https://doi.org/10.26438/ijcse/v6i5.906915}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.906915}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2086
TI - MANET Expansion Security Challenges Attacks and Intriguing future Trends
T2 - International Journal of Computer Sciences and Engineering
AU - Swati Agarwal, Rupinder Kaur, Tushar Agarwal
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 906-915
IS - 5
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
589 | 389 downloads | 240 downloads |
Abstract
In recent years, the interest in wireless networks has grown up because of the provision of wireless communication devices. While planning an ad hoc network specifically, we are worried about the abilities and confinements that the physical layer forces on the network performance. While designing MANET one can keep in mind, the types of difficulties we face, including signal security, the reliability of Portable devices and dynamic nature of nodes. Specialist brings up that the MANET, now a state of business investigates, was at first used as a piece of military endeavours, joining into vital frameworks and Defence Advanced Research Projects Agency (DARPA) wanders. In this paper we have depicted the advancement and essential issues of wireless ad-hoc network system and in addition we have also discussed vulnerabilities of MANET and Security services it has. This paper also highlights some intriguing future application of the MANET. At last we have proposed that how one can make MANET more powerful by the use of SMART DUST Technology.
Key-Words / Index Term
MANET, Routing Protocols, Wireless Networks, Ad hoc Networking, Smart Dust
References
[1] Ram Ramanathan and Jason Redi “A Brief Overview Of Ad Hoc Networks: Challenges and Directions” In the Proceedings of the 2002 IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002.
[2] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “An Overview of Mobile ad hoc Netwroks: Applications & Challenges.”
[3] Ankur O. Bang and Prabhakar L. Ramteke, “MANET: History, Challenges and Applications”, In the Proceedings of the 2013 International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 9, September 2013.
[4] J. Freebersyser and B. Leiner, “A DoD Perspective on Mobile Ad Hoc Networks,” Ad Hoc Networking, ed. C. E. Perkins, Addison-Wesley, 2001, p.29-51.
[5] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers” Proc. ACMSIGCOMM`94,ct.1994.
[6] D. B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts” Proc. ACM Mobicom`94, ec. 1994
[7] Ram Ramanathan and Jason Redi “A Brief Overview of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002
[8] Ankur O. Bang and Prabhakar L. Ramteke, “MANET: History, Challenges And Applications”, in Proc. of International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 9, September 2013.
[9] Mohit Kumar and Rashmi Mishra, “An Overview of MANET: History, Challenges and Applications”, et al / Indian Journal of Computer Science and Engineering (IJCSE)
[10] Mahima Chitkara et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.2, February- 2014, pg. 432-437.
[11] Tripathi Lalit Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (5), 2016, 2381-2384
[12] Aarti, IJARCSSE, “Study of MANET: Characteristic, Challenges, Applications and Security Attacks”, Vol.3, Issue: 5, ISSN: 2277-128X, pp: 252-257 (2013).
[13] Diaa Eldein Mustafa Ahmed, Othman O. Khalifa, “An Overview of MANETs: Applications, Characteristics, Challenges and Recent Issues”, in proc. Of International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-6 Issue-4, April 2017.
[14] Prabhleen Kaur, Sukhman, “An Overview on MANET- Advantages, Characteristics and Security Attacks”, in proc. Of International Journal of Computer Applications (0975 – 8887) 4th International Conference on Advancements in Engineering & Technology (ICAET 2016)
[15] I. Chlamtac, A. Lerner, Link allocation in mobile radio networks with noisy channel, in: IEEE INFOCOM, Bar Harbour and FL April 1986.
[16] I. Chlamtac, A. Lerner, Fair algorithms for maximal link activiation in multi-hop radio networks, IEEE Transactions on Communications COM-35 (7) (1987).
[17] Bakshi Aditya et.al, IJITEE, “Significance of Mobile AdHoc Network (MANET)”, Vol.2, Issue: 4, ISSN: 2278- 3075 (2013).
[18] H. k. Paramjit singh, “Review of Various MANET Protocols,” International Journal of Electrical and Electronics Engineers (IJEEE), vol. 7, pp. 318 – 329, 2015.
[19] Umesh Kumar Singh and Kailash Phuleria, “An analysis of Security Attacks found in Mobile Ad-hoc Network”, in proc. Of International Journal of Advanced Research in Computer Science, Volume 5, No. 5, May-June 2014.
[20] Priyanka Goyal, Vinti Parmar and Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, in proc. Of IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011.
[21] A Mishra and K.M Nadkarni, security in wireless Ad - hoc network, in Book. The Hand book of Ad Hoc Wireless Networks (chapter 30), CRC press LLC, 2003.
[22] Sampada Ganesh Daley and Taha Ansari, “Mobile Ad-Hoc Networks Its Advantages and Challenges”, in proc. Of International Journal of Electrical and Electronics Research, Vol. 3, Issue 2, pp: (491-496), Month: April - June 2015.
[23] HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,ǁ, Pg. 38-47, Vol 11, issue 1, Feb 2004.
[24] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.), year-2006 Springer, pp. 1-38.
[25] Sevil Şen, Joh n A. Clark, Ju an E. Tapiad or, “Security Threats in Mobile Ad Hoc Networks”, Department of Computer Science, University of York, YO10 5DD, UK, pp.1-22.
[26] Rakesh Kumar Singh, Rajesh Joshi, Mayank Singhal, “Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET)”, International Journal of Computer Applications (0975 – 8887) Volume 68– No.4, pp.25-29, April 2013.
[27] X.Zhao, Z. You, Z. Zhao, D. Chen, and F. Peng, “Availability Based Trust Model of Clusters for MANET,” presented at the 7th International Conference on Service Systems and Service Management (ICSSSM), 2011.
[28] Zhang Y., Lee W. (2005) Security in Mobile Ad-Hoc Networks. In: Mohapatra P., Krishnamurthy S.V. (eds) Ad Hoc Networks. Springer, Boston, MA.
[29] Jin-Hee Cho and Ing-Ray Chen “A Survey on Trust Management for Mobile Ad-Hoc Networks” IEEE Communications Surveys & Tutorials, Vol.13, No. 4, (2011, Oct).
[30] N.Dixit, S. Agrawal, and V. K. Singh, "A Proposed Solution for security Issues In MANETs," International Journal of Engineering Research & Technology(IJERT), vol. 2, 2013.
[31] P. Goyal, S. Batra and A. singh, “A Literature Review of Security Attack in Mobile Ad-hoc Networks”, in proc. Of International Journal of Computer Applications (0975 – 8887) Volume 9– No.12, November 2010.
[32] Latha Tamilselvan, Dr. V. Sankaranarayanan “Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks” IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.3, March 2007.
[33] Y. Hu, A. Perrig and D. Johnson, Ariadne: A, “Secure On-demand Routing Protocol forAd hoc Networks”, in Proceedings of ACM, MOBICOM’02, 2002.
[34] Vaithiyanathan, S. R. Gracelin, E. N. Edna, and S. Radha, "A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm," presented at the International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), 2010
[35] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. “A survey of routing attacks in mobile ad hoc networks” Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
[36] V.P.and R. P. Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application," IJCEM International journal of Computational Engineering & management, vol. 11, 2011.
[37] J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Wireless Telecommunications Symposium (WTS), 2012
[38] J.Su and H. Liu, “Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network,” Applied Informatics and Communication Communications in Computer and Information Science, vol. 224, pp. 233-240, 2011.
[39] H.Yang, X. Meng, S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,” ACM WiSe, 2002.
[40] Jyoti Thalor, Ms.Monika, “Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks,” A Review, International Journal of Advanced Research in Computer Science and Software Engineering.
[41] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-demand Secure Routing Protocol Resilient to Byzantine Failures,” Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
[42] A.K.Rai, R. R. Tewari, and S. K. Upadhyay, “different type of attacks on integrated MANET- internet comunication,” international jornal of computer science and security (IJCSS), vol. 4.
[43] C. Adjih, D. Raffo, and P. Muhlethaler, “Attacks against OLSR: Distributed Key Management for Security”, 2nd OLSR Interop/Wksp., Palaiseau, France, July 28–29, 2005.
[44] D.Sharma, P. G. Shah, and X. Huang, "Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key”
[45] P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks”, Int’l. J. Info. Tech., vol. 11, no. 2, 2005.