Open Access   Article Go Back

Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey

P. Gupta1 , P. Bansal2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 176-190, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.176190

Online published on Aug 31, 2018

Copyright © P. Gupta, P. Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Gupta, P. Bansal, “Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.176-190, 2018.

MLA Style Citation: P. Gupta, P. Bansal "Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey." International Journal of Computer Sciences and Engineering 6.8 (2018): 176-190.

APA Style Citation: P. Gupta, P. Bansal, (2018). Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey. International Journal of Computer Sciences and Engineering, 6(8), 176-190.

BibTex Style Citation:
@article{Gupta_2018,
author = {P. Gupta, P. Bansal},
title = {Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {176-190},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2674},
doi = {https://doi.org/10.26438/ijcse/v6i8.176190}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.176190}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2674
TI - Different Attacks and their Defense Line in Mobile Ad hoc Networks: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - P. Gupta, P. Bansal
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 176-190
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
550 326 downloads 205 downloads
  
  
           

Abstract

Mobile Ad hoc Network (MANET) provides on the fly solution for those areas where wired network implementation is difficult. MANETs are network without infrastructure. They do not have central control. All nodes help each other in data communication. The life span of MANET is very small. The main features of MANET are: nodes are dynamic in nature resources availability in scarce and open channel. Due to resource scarcity some nodes may not provide their services to other nodes and some nodes may not participate in data transmission, to save their resources and they become selfish node. MANETs are susceptible for attacks. The open channel, resource scarcity and deployment type of network attract intruders for malicious activities. This survey paper has reviewed various articles from 1999 to 2018, in the view to look at how malicious nodes in a network make attacks on other nodes and what impact goes on network. Earlier work have been discussed about one or two types of attacks. This paper has studied and tried to bring all attacks under the one umbrella. The paper discussed these attacks in following categories: External and internal, active and passive, at protocol stack layer, security goals, attacks affecting routing. This paper also come along with defense line, have been proposed by various researchers for different attacks. Paper also tries to put attacks and their effect on one place. It includes type of attack, status of attacker, interaction, layer and security goals. It is suggested that what type of, defense, line of action should be taken, so that a network must sustain in adverse situation and available for its users.

Key-Words / Index Term

Wireless, Ad hoc, attack, security, defense, countermeasures

References

[1] A. Dorri, S. R. Kamel, E Kheirkhah, “Security challenges in mobile ad hoc networks: a survey”, International Journal of Computer Science & Engineering Survey (IJCSES), vol-6, no-1, February, 2015.
[2] R. D. Pietro, S. Guarino, N. V. Verde, J. Domingo-Ferrer, “Security in wireless ad-hoc networks–A survey”, Journal of Computer Communications, vol-51, pp-1-20, 2014.
[3] N Islam. “Security Issues in Mobile Ad Hoc Network”, In 19th IEEE International Conference on Networks (ICON2013) Singapore, Springer-Verlag Berlin Heidelberg, 2013.
[4] A. K. Abdelaziz, Nafaa M. Salim G., “Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks”,. In 15th International Conference Computer Modeling and Simulation (UKSim), Cambridge University, 2013.
[5] E. M. Shakshuki, N. Kang, T. R. Sheltami, “EAACK—a secure intrusion-detection system for MANETs”, IEEE Transactions on Industrial Electronics, vol-60, no-3, pp-1089-1098, 2013.
[6] A. Nadeem, M. P. Howarth, “A survey of MANET intrusion detection & prevention approaches for network layer attacks”, IEEE Communications Surveys & Tutorials, vol-15, no-4, pp-2027-2045, 2013.
[7] G. J. Moses, P. S. Varma, N.Supriya, G. NagaSatish, “Security Aspects and Challenges in Mobile Ad Hoc Networks”, International Journal Computer Network and Information Security, in MECS Press, June 2012.
[8] A. M. Kanthe, D. Simunic, R. Prasad, “Effects of malicious attacks in mobile ad-hoc networks”, In IEEE International Conference on Computational Intelligence & Computing Research (ICCIC), pp-1-5, 2012.
[9] H. Aldabbas, T. Alwada’n, H. Janicke, A. Al-Bayatti, “Data Confidentiality in Mobile Ad hoc Networks”, International Journal of Wireless & Mobile Networks (IJWMN) vol-4, no-1, 2012.
[10] J Karlsson, L. S. Dooley, G. Pulkkis, “Routing Security in Mobile Ad-hoc Networks”, Informing Science and Information Technology Education Conference (InSITE’12), pp-22-27, Montreal, Canada, 2012.
[11] J. V. Mulert, I Welch, W. KG Seah, “Security threats and solutions in MANETs: A case study using AODV and SAODV”, Journal of Network and Computer Applications, vol-35, no-4, pp-1249-1259, 2012.
[12] H. Ehsan, F. A. Khan, “Malicious AODV: implementation and analysis of routing attacks in MANETs”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp-1181-1187, 2012.
[13] A. M. Kanthe, D. Simunic, M. Djurek, “Denial of service (DoS) attacks in green mobile ad-hoc networks”, In proceedings of the 35th IEEE International Convention MIPRO, pp-675-680, 2012.
[14] A. M. Kanthe, D. Simunic, R. Prasad, “A mechanism for greyhole attack detection in Mobile ad hoc networks”, International journal of computer applications, ISSN-0975-8887, vol-53, no-16, 2012.
[15] S. A. Begum, L. Mohan, B. Ranjitha, “Techniques for resilience of denial of service attacks in mobile ad hoc networks”, In proceedings of International Journal of Electronics Communication and Computer Engineering, no-1, 2012.
[16] M. Stojanovic, V. Acimovic-Raspopovic, V. Timcenko, “The impact of mobility patterns on MANET vulnerability to DDoS attacks”, Research Journal of Electronics and Electrical Engineering, vol-119, no-3, pp-29-34, 2012.
[17] A Annamalai, V Yegnanarayanan, “Secured system against DDoS attack in mobile ad hoc network”, WSEAS Transactions on Communications, vol-9, 2012.
[18] E Lee, “Security in Wireless Ad Hoc Networks”, Science Academy Transactions on Computer and Communication Networks, vol-1, no-1, 2011.
[19] S. Şen, J. A. Clark, J. E. Tapiador, “Security Threats in Mobile Ad Hoc Networks”. Book Title: Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Auerbach Publications, CRC Press, 2011.
[20] K. Laeeq, “Security Challenges & Preventions in Wireless Communication”, International Journal of Scientific and Engineering Research vol-2, Issue-5, pp-213-220, 2011.
[21] K. Konate, Abdourahime, G, “Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation”, 2nd International Conference on Intelligent Systems, Modeling and Simulation (ISMS), Kuala Lumpur. 2011.
[22] J. Montero-Castillo, E. Palomar, “Cooperation in Ad Hoc Network Security Services: Classification and Survey”, 5th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM, 2011.
[23] P. Joshi, “Security issues in routing protocols in MANETs at network layer”, Procedia Computer Science of World Congress on Information Technology Published by Elsevier, pp-954-960, 2011.
[24] F. Tseng, L. Chou, H. Chao, “A survey of black hole attacks in wireless mobile ad hoc networks”, Human-centric Computing and Information Sciences, Springer open journal, 2011.
[25] S. Agrawal, S. Jain, S. Sharma, “A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks”, Journal of Computing, NY, USA, ISSN 2151-9617, vol-3, Issue 1, 2011.
[26] A. Abdullah S, “Rushing attack in mobile ad hoc networks”, 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp-752-758, 2011.
[27] D. Dong, M. Li, Y. Liu, X. Li, X. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks”, IEEE/ACM Transactions on Networking (TON), vol-19, no-6, pp-1787-1796, 2011.
[28] Q. Jia, K. Sun, A. Stavrou, “CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET”, In proceedings of IEEE 20th International Conference on Computer Communications and Networks (ICCCN), pp-1-6, 2011.
[29] Z. M. Fadlullah, T. Taleb, M. Schöller, “Combating Against Security Attacks against Mobile Ad hoc Networks (MANETs)”, Security of Self-Organizing Networks MANET, WSN, WMN, VANET Auerbach Publications, Print ISBN: 978-1-4398-1919-7, 2010.
[30] R. Shrestha, K. Han, D. Choi, S. Han, “A novel cross layer intrusion detection system in MANET”, IEEE 24th International Conference on Advanced Information Networking and Applications (AINA), pp-647-654, 2010.
[31] P. O. Mohammad, M. Cardei, J. Wu, “Routing security in ad hoc wireless networks”, Network Security, pp-117-142. Springer US, 2010.
[32] A. H. Al-Bayatti, H. Zedan, A. Cau, “Security solution for mobile ad hoc network of networks (manon)”, 5th IEEE International Conference on Networking and Services, ICNS`09, pp-255-262, 2009.
[33] M. Azer, S. M. El-Kassas, M. S. El-Soudani, “Security in Ad Hoc Networks: From Vulnerability to Risk Management”, IEEE 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE`09, pp-203-209, 2009.
[34] L. Ertaul, D. Ibrahim, “Evaluation of Secure Routing Protocols in Mobile Ad hoc Networks (MANETs)”, International Conference on Security and Management SAM`09, Las Vegas, 2009.
[35] M. Kargar, M. Ghodsi, “Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes”, International Journal of Security and its Applications, vol- 3, no- 1, pp-117-128, 2009.
[36] M. Nogueira, L,Aldri, L. Santos, G. Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks”, IEEE Communications Surveys & Tutorials, vol-11, Issue-1, 2009.
[37] R. M. Savola, H. Abie, “On-line and off-line security measurement framework for mobile ad hoc networks”, Journal of Networks, vol- 4, no-7, pp-565-579, 2009.
[38] A. Hamieh, J. Ben-Othman, “Detection of jamming attacks in wireless ad hoc networks using error distribution”, IEEE International Conference on Communications, ICC`09, pp-1-6, 2009.
[39] A. Mishra, “Security and Quality of Services in Ad Hoc Wireless Networks”, Cambridge University Press, 2008.
[40] L. Abusalah, A. Khokhar, M. Guizani, “A survey of secure mobile ad hoc routing protocols”, IEEE Communications Surveys & Tutorials, vol-10, no-4, pp-78-93, 2008.
[41] H. L. Nguyen, U. T. Nguyen, “A study of different types of attacks on multicast in mobile ad hoc networks”, Ad Hoc Networks vol-6, no-1, published by Elsevier, pp-32-46, 2008.
[42] J. Ruiz, J. Friginal, D. de-Andrés, P. Gil, “Black Hole Attack Injection in Ad hoc Networks”, Fault Tolerance Systems Group (GSTF), Valencia, Spain, 2008.
[43] J. Luo, M. Fan, D. Ye, “Black hole attack prevention based on authentication mechanism”, IEEE International Conference on Communication Systems, ICCS 2008, pp-173-177, 2008.
[44] S. Choi, D. Kim, D. Lee, J. Jung, “WAP: Wormhole attack prevention algorithm in mobile ad hoc networks”, IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, SUTC`08, pp- 343-348, 2008.
[45] I. Aad, J. Hubaux, E. W. Knightly, “Impact of denial of service attacks on ad hoc networks”, IEEE/ACM Transactions on Networking, vol-16, no-4, pp-791-802, 2008.
[46] Y. Zhang, L. Lazos, W. Jr. Kozma, “AMD: Audit Based Misbehavior Detection in Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol- X, no-X, 2008.
[47] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security Signals and Communication Technology, Springer USA, pp-103-135, 2007.
[48] F. Anjum, P. Mouchtaris, “Security for Wireless Ad Hoc Networks”, John Wiley & Sons, Inc., Hoboken, New Jersey, 2007.
[49] J. Jeong Z. J. Haas, “An Integrated Security Framework for Open Wireless Networking Architecture”, IEEE Wireless Communications, vol-14, Issue: 2, pp-10-18, 2007.
[50] J. C. Park, S. K. Kasera, “Securing ad hoc wireless networks against data injection attacks using firewalls”, IEEE Conference on Wireless Communications and Networking, WCNC , pp- 2843-2848, 2007.
[51] Q. Gu, P. Liu, C. Chu, S. Zhu, “Defense against packet injection in ad hoc networks”, International Journal of Security and Networks vol-2, no-1-2, pp-154-169, 2007.
[52] P-W. Yau, S. Hu C. J. Mitchell, “Malicious attacks on ad hoc network routing protocols”, International Journal of Computer Research, vol-15, no-1, pp-73-100, 2007.
[53] B. Kannhavong, H. Nakayama, Y. Nemoto, N. K. A. Jamalipour, “A survey of routing attacks in mobile ad hoc networks”, IEEE Wireless communications, vol-14, no-5, pp-85-91, 2007.
[54] F. Xing, W. Wang, “Understanding dynamic denial of service attacks in mobile ad hoc networks”, IEEE Military Communications Conference, MILCOM , pp-1-7, 2006.
[55] P. Papadimitratos, “Secure ad hoc networking”, 3rd IEEE Consumer Communications and Networking Conference, CCNC, pp-10-14, 2006.
[56] T. Roosta, S. Shieh, S. Sastry, “Taxonomy of security attacks in sensor networks and countermeasures”, 1st IEEE international conference on system integration and reliability improvements, vol-25, pp-94-103, 2006.
[57] Y. Hu, A. Perrig, D. B. Johnson, “Wormhole attacks in wireless networks”, IEEE Journal on Selected Areas in Communications, vol-24, no-2, pp-370-380, 2006.
[58] Jim P, A. Patwardhan, A. Joshi, “Cross-layer analysis for detecting wireless misbehavior”, In proceedings of the IEEE Consumer Communications and Networking Conference (CCNC), pp-6-9, 2006.
[59] D. Djenouri, L. Khelladi, N. Badache, “A survey of security issues in mobile ad hoc networks”, IEEE communications surveys, vol-7, no-4, pp-2-28, 2005.
[60] A. Chandra, “Ontology for MANET Security Threats”, In proceedings of Second National Conference on Network Engineering. NCON, 2005.
[61] M. Denko, “Detection and prevention of Denial of Service (DoS) attacks in mobile ad hoc networks using reputation-based incentive scheme”, Journal of Systemics, Cybernetics and Informatics, vol-3, no-4, pp-1-9, 2005.
[62] W. Yu, K. J. Liu, “Attack-resistant cooperation stimulation in autonomous ad hoc networks”, IEEE Journal on Selected Areas in Communications, vol-23, no-12, pp-2260-2271, 2005.
[63] A. Mishra, K. Nadkarni, A. Patcha, “Intrusion detection in wireless ad hoc networks”, IEEE Wireless Communications, vol-11, no-1, pp-48-60, 2004.
[64] H.Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in mobile ad hoc networks: challenges and solutions”, IEEE Wireless Communications, vol-11, no-1, pp- 38-47, 2004.
[65] S. A. Razak, S. M. Furnell, P. J. Brooke, “Attacks against mobile ad hoc networks routing protocols”, In proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (PGNET’04), 2004.
[66] Y. Huang, W. Lee, “Attack analysis and detection for ad hoc routing protocols.: Recent advances in intrusion detection”, Springer Berlin Heidelberg, pp-125-145, 2004.
[67] H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, “Self-securing ad hoc wireless networks”, In proceeding of 7th International Symposium on Computers and Communications, ISCC 2002.
[68] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. B. Royer, “A secure routing protocol for ad hoc networks”, In proceedings of IEEE 10th International Conference on Network Protocols, pp-78-87, 2002.
[69] L. Zhou, Z. J. Haas, “Securing Ad Hoc Networks”, IEEE network, special issue on network security, vol-13, no-6, pp-24-30, 1999.
[70] A. B. Suryawanshi, B. K Saini, “Survey on Various Routing Protocols in Ad-hoc Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.174-178, 2017.
[71] A.vani, “Detection and Elimination of Wormhole Attacks in a MANET ”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.5, Issue.5, pp.35-40, 2017.
[72] P. Gupta, P. Bansal, “A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks”, In proceedings of 2nd International Conference on Information and Communication Technology for Competitive Strategies, (ICTCS-2016), p.25, ACM 2016.
[73] P. Gupta P. Bansal, “Authentication Process using Secure Sum for a New Node in Mobile Ad Hoc Network” International Conference on Data, Engineering and Applications (IDEA-2k17), Springer 2017.