Open Access   Article Go Back

A Study on Security Threats in Manets

Vaidya Omkar1 , Gautam Amiya2 , N Jaisankar3

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-5 , Page no. 47-53, May-2016

Online published on May 31, 2016

Copyright © Vaidya Omkar, Gautam Amiya, N Jaisankar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vaidya Omkar, Gautam Amiya, N Jaisankar, “A Study on Security Threats in Manets,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.47-53, 2016.

MLA Style Citation: Vaidya Omkar, Gautam Amiya, N Jaisankar "A Study on Security Threats in Manets." International Journal of Computer Sciences and Engineering 4.5 (2016): 47-53.

APA Style Citation: Vaidya Omkar, Gautam Amiya, N Jaisankar, (2016). A Study on Security Threats in Manets. International Journal of Computer Sciences and Engineering, 4(5), 47-53.

BibTex Style Citation:
@article{Omkar_2016,
author = {Vaidya Omkar, Gautam Amiya, N Jaisankar},
title = {A Study on Security Threats in Manets},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {47-53},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=902},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=902
TI - A Study on Security Threats in Manets
T2 - International Journal of Computer Sciences and Engineering
AU - Vaidya Omkar, Gautam Amiya, N Jaisankar
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 47-53
IS - 5
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1868 1573 downloads 1617 downloads
  
  
           

Abstract

MANETs have very unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are sensitive to different types of attacks in different layers of protocol stack. Each node in a MANETs is capable of acting as a router. Routing is one of the aspects having various security concerns. MANETs has no rigid line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of mischievous nodes, one of the main challenges in MANETs is to design the robust security solution that can protect MANETs from various routing attacks. This paper present survey of common attacks on network layer namely Black-hole, Wormhole and Gray-hole attack which are serious threats for MANETs. This paper also discusses some proposed solutions which help to detect and prevent these attacks. MANETs can operate in isolation or in coordination with a wired infrastructure, often via a gateway node participating in both networks for traffic relay. This flexibility, along with their self-organizing powers, is one of MANET's biggest strengths, as well as their biggest security weaknesses.

Key-Words / Index Term

MANETs; Security; Attacks; Wormhole Attack; Black-hole Attack; Gray-hole Attack

References

[1] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011
[2] Bo-Cang Peng and Chiu-Kuo Liang “Prevention techniques for flooding attack in Ad Hoc Networks”, IEEE, 2006
[3] Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris, “A High-Throughput Path Metric for Multi-Hop Wireless routing”, in ACM Mobicom, 2003.
[4] D.M. Shila, and T. Anjali, “Defending selective forwarding attacks in WMNs”, IEEE International Conference on Electro/Information Technology, 2008, 96-101.
[5] X.P. Gao; and W. Chen, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks[C]”, IFIP International Conference on Network and Parallel Computing Workshops, 2007, 209-214.
[6] Hongmei Deng, Wei Li, and Dharma P.Agrawal,“Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, vol. 40,Issue: 10, 2002
[7] Tamilselvan L, and Sankaranarayanan V, “Prevention of Black hole Attack in MANET”, Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.
[8] Payal N. Raj and Prashant B. Swadas,”DPRAODV: A dynamic learning system against black hole attack in AODV based Manet”, International Journal of Computer Science Issues (IJCSI), Vol. 2, Issue 3, pp.: 54-59,
[9] Nital Mistry, Devesh C Jinwala, Member, IAENG, and Mukesh Zaveri, “Improving AODV Protocol against Black hole Attacks”, IMECS2010
[10] Hakem Beitollahi ⇑, Geert Deconinck (2012), Analysing well-known countermeasures against distributed denial of service attacks, Elsevier journal, vol 35, pages 1312-1332.
[11] Ningrinla Marchang a, Raja Datta (2008), Collaborative techniques for intrusion detection in Mobile ad-hoc networks, Elsevier journal, vol 6, pages 508-523.
[12] Sudip Misra, P. Venkata Krishna,_, Kiran Isaac Abraham, Navin Sasikumar, S. Fredun(2010), An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Elsevier journal,vol. 60,pages 294-306.
[13] Hung-Jen Liao, Chun-HungRichardLin, Ying-ChihLin, Kuang-YuanTung (2013), Intrusion detection system: A comprehensive review, Elsevier journal, vol.36, pages 16-24.
[14] Shelly Xiaonan Wu, Wolfgang Banzhaf (2010), the use of computational intelligence in intrusion detection systems: A review, Elsevier journal, vol.10, pages 1-35
[15] Adrian P. Lauf, Richard A. Peters, William H. Robinson(2010), A distributed intrusion detection system for resource-constrained devices in ad-hoc networks, Elsevier journal,vol.8,pages 253-266