Open Access   Article Go Back

An Analysis of Applications, Challenges and Security Attacks in MANET

G. Sabeena Gnanaselvi1 , T.V.Ananthan 2

  1. Department of CSE&IT, Dr.M.G.R. Educational and Research Institute, Chennai, India.
  2. Department of CSE&IT, Dr.M.G.R. Educational and Research Institute, Chennai, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 941-947, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.941947

Online published on May 31, 2018

Copyright © G. Sabeena Gnanaselvi, T.V.Ananthan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Sabeena Gnanaselvi, T.V.Ananthan, “An Analysis of Applications, Challenges and Security Attacks in MANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.941-947, 2018.

MLA Style Citation: G. Sabeena Gnanaselvi, T.V.Ananthan "An Analysis of Applications, Challenges and Security Attacks in MANET." International Journal of Computer Sciences and Engineering 6.5 (2018): 941-947.

APA Style Citation: G. Sabeena Gnanaselvi, T.V.Ananthan, (2018). An Analysis of Applications, Challenges and Security Attacks in MANET. International Journal of Computer Sciences and Engineering, 6(5), 941-947.

BibTex Style Citation:
@article{Gnanaselvi_2018,
author = {G. Sabeena Gnanaselvi, T.V.Ananthan},
title = {An Analysis of Applications, Challenges and Security Attacks in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {941-947},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2091},
doi = {https://doi.org/10.26438/ijcse/v6i5.941947}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.941947}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2091
TI - An Analysis of Applications, Challenges and Security Attacks in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - G. Sabeena Gnanaselvi, T.V.Ananthan
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 941-947
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1125 396 downloads 311 downloads
  
  
           

Abstract

Mobile ad-hoc networks (MANETs) are the independent collection of devices connected without the usage of manipulates base station or gets admission to factors. Mobile ad-hoc network includes a group of nodes outfitted with wireless interfaces, which are ready to communicate among themselves within the elimination of network infrastructure. In MANETs, nodes can operate records immediately with every different and every node perform like a router. As compared with stressed out networks. MANETs are greater defenseless because of safety attacks attributable to an infrastructure much less community. Presenting the protection measures has changed into a critical part in MANETs. This paper presents an impression of MANETs with various applications, plenty of attacks and demanding situations.

Key-Words / Index Term

MANETs, Defenceless,Router, Attacks,Infrastructure less network

References

[1] Vishnu BalanE,PriyanMK,GokulnathC, Prof.Usha Devi G,”Fuzzy Based Intrusion Detection Systems in MANET,” Elsevier, Vol.50, pp.109-114, 2015.
[2] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang,Han-ChiehChao,andChin-FengLai, “Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach,” IEEE Systems Journal,Vol.9, pp.65-75,2015.
[3] C.Chang,Y.Wang, and H.Chao, “An efficient Mesh-based core multicast routing protocol on MANETs,”InternetTechnology.,Vol.8, pp.229–239, 2007.
[4] SarikaSa,PravinAb,VijayakumarAc, SelvamaniKd,” Security Issues In Mobile Ad Hoc Networks,” 2nd InternationalConference on Intelligent Computing,Communication&Convergence,Vol.94, pp.329 –335,2016.
[5] Amitabh Mishraand Ketan M. Nadkarni, “Security inWirelessAdHocNetworks”, in Book The Handbook ofAdHocWirelessNetworks (Chapter30), CRCPress LLC,2003
[6] Sk. HeenaKauser, P. Anil Kumar, “MANET: Services, Parameters,Applications, Attacks&Challenges,” IJSRSET,Vol.2, Print Online ISSN:2394-4099.2016, 2016.
[7] JSandeepa,JSatheeshKumarb1,”Efficient Packet Transmission and Energy Optimization in Military Operation Scenarios of MANET,”Elsevier,Vol.47, pp.400– 407,2015.
[8] Meenakshi Tripathi,M.S.Gaur,V.Laxmi,”Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN,”The 8th International Symposium on Intelligent Systems Techniques for AdHoc and Wireless Sensor Networks (IST- AWSN),Vol.19, pp.1101–1107,2013.
[9] Mr.VikasKumar,Mr.AmitTyagi, Mr.Amit Kumar,“Mobile Ad-hocNetwork:Characteristics, Applications, Security Issues,Challenges and Attacks”,,International JournalofAdvanced Research inComputer Science and Software Engineering,Vol.5, pp.258-262,2015.
[10] SonuKumar,AdityaSoni,RaviKumar,”Remote Patient Monitoring and MANET:Applications and Challenges,”InternationalJournal on Recent and Innovation TrendsinComputing and Communication, Vol. 3 , pp.4275-4283,2015.
[11] C Ramakristanaiah R.PraveenSam,”A SurveyonMANETs inDisasterRescue Operations,” International JournalofScienceand Research (IJSR) ,Vol.4, ISSN(Online): 2319-7064,2015.
[12] Aftab,M.U.,Nisar,A.,Asif,D.,Ashraf,A.andGill,B.”RBAC Architecture Design Issues in Institutions Collaborative Environment,”.InternationalJournalofComputer Science,Vol.10 ,pp.216-221,2013.
[13] Aftab, M.U., Habib, M.A., Mehmood, N., Aslam, M. and Irfan, M. ,” Attributed Role Based Access Control Model,” IEEE Conference on Information Assurance and Cyber Security(CIACS),pp.83-89.,2015.
[14] Goyal, P.,Parmar,V.andRishi,R ,”Manet: Vulnerabilities, Challenges, Attacks, Application,”International Journalof Computational Engineering &Management, Vol.11, pp.32-37,2011.
[15] Hao Yang, HaiyunLuo, Fan Ye, Songwu Lu, And Lixia Zhang,” Security In Mobile Ad Hoc Networks: Challenges And Solutions “IEEE Wireless Communications ,ISSN.1536-1284, 2004.
[16] HongqiangZhai and Yuguang Fang “A Solution To Hidden Terminal Problem Over A Single Channel In Wireless Ad Hoc Networks”IEEE , ISSN. 2155-7578 ,2007.
[17] G. S. Mamatha, Dr. S. C. Sharma, “Analyzing The Manet Variations, Challenges, Capacity And Protocol Issues” International Journal Of Computer Science & Engineering Survey (IJCSES) Vol.1, pp.14-21,2010.
[18] Lei Chen, and Wendi B. Heinzelman,”QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks” IEEE Journal On Selected Areas In Communications, Vol.23, 2005.
[19] Naeem Raza, Muhammad Umar Aftab, Muhammad Qasim Akbar, Omair Ashraf, Muhammad Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges” Communications and Network, Scientific Research Publishing ,pp.131-136,2016.
[20] Dr.Nabeel Zanoon1, Dr.Nashat Albdour2, Dr.Hatem S. A. Hamatta1, and RashaMoh`d Al- Tarawneh1, “Security Challenges As A Factor Affecting The Security Of Manet: Attacks, And Security Solutions”, International Journal of Network Security & Its Applications (IJNSA) Vol.7, pp. 1-13,2015.
[21] T.Navaneethan,M.Lalli,”Security Attacks in Mobile Ad-hoc Networks–A Literature Survey”, International Journal of Computer Science and Mobile Applications,Vol.2 , pg.1-7,2014.
[22] AbhayKumarRai ,Rajiv Ranjan Tewari.Saurabh Kant Upadhyay,”Different Types of Attacks on Integrated MANET- Internet Communication,” International Journal of Computer Science and Security (IJCSS)Vol.4, pp.265-274.
[23] Ashish kumarkhare, , Dr. R. C. Jain, Dr. J. L. Rana,”A Review: Trust, Attacks And Security Challenges In Manet” Informatics Engineering, an International Journal (IEIJ), Vol.3, pp.293-298,2015.
[24] Manjeet Singh, Gaganpreet Kaur,”A Surveys of Attacks in MANET” International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, pp.1631-1636, 2013.
[25] Gagandeep, Aashima, Pawan Kumar,“Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review,”,International Journal of Engineering and Advanced Technology (IJEAT) ,Vol.1.pp.269-275, 2012.
[26] Ms.Supriya and Mrs.Manju Khari,“Manet Security Breaches :Threattoa Secure communication Platform”, International Journal on AdHoc Networking Systems (IJANS), Vol.2, pp.45-51, 2012.
[27] Aarti Chauhan,PuneetRani.“A Detail Review of Routing Attacks in Mobile AdHoc Networks”, International Journal of Engineering Research and General Science,Vol.3, pp.1154-1163, 2015.
[28] B.Awerbuch, D.Holmer,C.Nita Rotaru and Herbert Rubens,“An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,”Proceedings of the ACM Workshop on Wireless Security , ISBN:1-58113-585-8 , pp.21-30, 2002.
[29] M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar, JaydipSen,”A mechanism for detection of Gray Hole Attack in Mobile Ad Hoc Networks,” ICICS ,IEEE , ISBN:1-4244-0983-7, 2007.
[30] Vishnu K, Amos J Paul, ”Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC Networks,” International Journal of computer Application ,Vol.1, pp.38-42, 2010.
[31] Bing Wu, Jianmin Chen, Jie Wu, MihaelaCardei, “A Survey on Attacks and Counter measures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security, Springer , pp.104-109, 2006.
[32] Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S.Ali, Prof. J.S. Deshpande,” A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology ,Vol. 2(9), pp.4063-4071,2010.
[33] Rutvij H. Jhaveri, Sankita J. Patel, Devesh C. Jinwala,” DoS Attacks in Mobile Ad-hoc Networks: A Survey”, IEEE Second International Conference on Advanced Computing & Communication Technologies, pp.535-541, 2012.
[34] L.Zhouand Z.J. Haas, “Securing AdHoc Networks,”.IEEE Network Magazine, Vol.13, pp.24-30,1999.
[35] Ping Yi, YipingZhong, ShiYong Zhang,” Resisting Flooding Attacks in ad hoc Networks” IEEE International Conference on Information Technology: Coding and Computing (ITCC’05) ,ISBN:0-7695-2315-3, 2005.
[36] K. Geetha1 • N. Sreenath2,”Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol” springer , Vol.41, pp.1161-1172,2016.
[37] A.Janani, A.Sivasubramanian "Survey of Packet Dropping Attacks in MANET "Indian Journal of Computer Science and Engineering (IJCSE), Vol. 5, pp.26-31, 2014.