Open Access   Article Go Back

Manet Security and Attacks Issues, Challenges & Solutions

K. Sumathi1 , D. Vimal Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 433-437, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.433437

Online published on Mar 31, 2019

Copyright © K. Sumathi, D. Vimal Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Sumathi, D. Vimal Kumar, “Manet Security and Attacks Issues, Challenges & Solutions,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.433-437, 2019.

MLA Style Citation: K. Sumathi, D. Vimal Kumar "Manet Security and Attacks Issues, Challenges & Solutions." International Journal of Computer Sciences and Engineering 7.3 (2019): 433-437.

APA Style Citation: K. Sumathi, D. Vimal Kumar, (2019). Manet Security and Attacks Issues, Challenges & Solutions. International Journal of Computer Sciences and Engineering, 7(3), 433-437.

BibTex Style Citation:
@article{Sumathi_2019,
author = {K. Sumathi, D. Vimal Kumar},
title = {Manet Security and Attacks Issues, Challenges & Solutions},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {433-437},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3858},
doi = {https://doi.org/10.26438/ijcse/v7i3.433437}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.433437}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3858
TI - Manet Security and Attacks Issues, Challenges & Solutions
T2 - International Journal of Computer Sciences and Engineering
AU - K. Sumathi, D. Vimal Kumar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 433-437
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
271 227 downloads 184 downloads
  
  
           

Abstract

The mobile ad hoc network, security has been active research topic but due to self-configuring characteristics of mobile ad hoc network there are numerous like shared wireless medium with open network design, limited resources, dynamic network topology and many more that hinder to maintain the security of the wireless network. Because of MANET’s properties like infrastructure-less and self-configuring, there are more risks for trusted nodes to be compromised and start attack on networks. It is hard to recognize between stale routing and faked routing data on account of node mobility system. In node mobility mechanism it authorizes frequent networking reconfiguration which makes more risks for attacks. Due to limited power consumption and computation capability mobile devices are helpless against the blackhole and grey hole attack as they are inadequate to run security algorithms which require high computations like public key algorithms. In this problem consider as a propose system the power and delay optimization protocol may be integrated to improve the performance of the network. The delay aware hash-based message authentication code (D-HMAC) used to secure the packet sending between source to destination without greyhole and blackhole attacks. The experimental result using NS2 simulation the proposed algorithm achieves better performance and attack detection accuracy than the existing trust level methods.

Key-Words / Index Term

Mobile Ad-hoc Network, Security Issues, Routing Protocols, Attacks

References

[1] Weimin Wen,et al., "EAPC: Energy-Aware Path Construction for Data Collection Using Mobile Sink in Wireless Sensor Networks" IEEE SENSORS JOURNAL, VOL. 18, NO. 2, JANUARY 15, 2018
[2] Ying Liu et al., "Secure Distributed Estimation over Wireless Sensor Networks under Attacks" IEEE Transactions on Aerospace and Electronic Systems ( Volume: 54 , Issue: 4 , Aug. 2018 )
[3] Shoubai Xiao "Security Analysis and Application of Common Dynamic Routing Protocol", 7th International Conference on Education, Management, Computer and Society (EMCS 2017)
[4] Mandeep Kaur Gulati "Stable Energy efficient QoS based Congestion and Delay aware Routing (SEQCDR) Protocol forMANETs" 2015 International Conference on Communications and Signal Processing (ICCSP) 2-4 April 2015
[5] Shiva Shankar "Importance of on-demand modified power aware dynamic source routing protocol in mobile ad-hoc networks" IET Microwaves, Antennas & Propagation ( Volume: 8 , Issue: 7 , May 14 2014 )
[6] Shivashankar "Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks", IET Networks ( Volume: 3 , Issue: 2 , June 2014 )
[7] Mueen Uddin "Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function" IEEE Access ( Volume: 5 ) 24 May 2017.
[8] A.Siddiqua, S.Kotari, and AAKhan Mohammed. “Preventing black hole attacks in MANETs using secure knowledge algorithm”, Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon. IEEE, 2015.
[9] N.Choudhary and L.Tharani. “Preventing black Hole attack in AODV using timer-based detection mechanism”, Signal processing and communication engineering systems (SPACES), 015 international conferenceon. IEEE,2015.
[10] AK Jain and V Tokekar. “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile adhoc Networks”, Pervasive computing (ICPC), 2015 international conference on. IEEE, 2015