A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network

Authors

  • Shailja Sharma Computer Science, Career College, Bhopal, India

Keywords:

MANET, Protocols, Attacks, Security Issues

Abstract

MANETs has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open access medium, dynamically changing network topology and lack of centralized monitoring point. The various attacks against mobile nodes are flooding, black hole, warm hole, packet dropping and Byzantine attack as well as Collaborative attacks i.e. human attackers or criminal organizations etc. We have addressed the Vulnerabilities and attacks in MANETs in this paper.

 

References

Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, An analysis of Security Attacks found in Mobile Ad-hoc Network, International Journal of Advanced Research in Computer Science, Volume 5, No. 5, pp. 34-39, May-June 2014.

Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks.

H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.

L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, IC#/ICO#S/MCL`06, vol. 2006, p. 1628384, 2006.

S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," 2004.

C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON `97, Apr. 1997, pp. 197-211.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91.

Z. Karakehayov, “Using REWARD to Detect Team Black- Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.

S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.

Shuyao Yu, Youkun Zhang, Chuck Song and Kai Chen, security architecture for Mobile Ad Hoc Networks”. http://www.portal.prozhe118.com, pp.1-4.

L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, , vol. 2, 2006.

S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," www.scm.tees.ac.uk, pp.-1-6, 2004.

A. Mishra, Security and Quality of Service in Ad Hoc Wireless Networks, 2008.

L. Tamilselvan and V. Sankaranarayanan, "Prevention of co-operative black hole attack in MANET," Journal of networks, vol. 3, pp. 13-20, 2008.

H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002.

S. Saraeian, F. Adibniya, M. GhasemZadeh, and S. Abtahi, "Performance Evaluation of AODV Protocol under DDoS Attacks in MANET," Proceedings of World Academy of Science, Engineering and Technology, vol. Vol. 33, pp. 501 - 503, September 2008.

Abolhasan, M., Wysocki, T., and Dutkiewicz, E. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 2004, pp. 1–22.

Downloads

Published

2018-04-30

How to Cite

[1]
S. Sharma, “A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network”, Int. J. Sci. Res. Net. Sec. Comm., vol. 6, no. 2, pp. 66–69, Apr. 2018.

Issue

Section

Review Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.