Security mechanism in wireless ad-hoc networks is
a highly a challenging concern. Security in the MANET
communication network is significant for secure transmission of
information. Many security mechanisms for mobile ad-hoc
network (MANET) have been proposed in the day to day events.
Absence of any central co-ordination mechanism and shared
wireless medium makes MANET more susceptible to cyber
attacks than wired network there are a number of attacks that
affect MANET. In MANET, all networking functions such as
routing and packet distribution are performed by nodes in a self
organizing manner. Due to these reasons, securing a Mobile Adhoc
Network is very challenging.
BALAMURUGAN G : M.Tech., student in a stream of Computer
Science & Engineering at Manakula Vinayagar Institute of
Technology, Pondicherry University, Pondicherry, India.
SOMASUNDARAM R : M.Tech., student in a stream of Computer
Science & Engineering at Manakula Vinayagar Institute of
Technology, Pondicherry University, Pondicherry, India.
SUMITHRA K : M.Tech., student in a stream of Computer Science &
Engineering at Manakula Vinayagar Institute of Technology,
Pondicherry University, Pondicherry, India.
MANET
Security mechanism
rushing attack
black hole attack
neighbor attack and jellyfish attack
Maintaining of dynamic topology and the distributed
operation on MANET is more vulnerable to many attacks.
In this paper, we discuss various types of security attacks
and its function. Different security mechanisms are
introduced in order to prevent MANET and also identify
the type of attack which has been occurred in the
MANET.
[1] Priyanka Goyal, Vinti Parmar and Rahul Rishi,
“MANET: Vulnerabilities, Challenges, Attacks,
Application”, IJCEM International Journal of
Computational Engineering & Management, Vol. 11,
January 2011.
[2] Gaga deep, Aashima and Pawan Kumar “Analysis of
Different Security Attacks in MANETs on Protocol
Stack”. International Journal of Engineering and
Advanced Technology (IJEAT), Volume-1, Issue-5,
June 2012
[3] Mohammad Wazid, Rajesh Kumar Singh and R. H.
Goudar, “A Survey of Attacks Happened at Different
Layers of Mobile Ad-Hoc Network & Some Available
Detection Techniques “International Journal of
Computer Applications® (IJCA) International
Conference on Computer Communication and
Networks CSI- COMNET2011.
[4] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao
“ A survey of black hole attacks in wireless mobile ad
hoc networks” Human-centric Computing and
Information Sciences 2011
[5] Sunil Taneja and Ashwani Kush, “ A Survey of
Routing Protocols in Mobile Ad-Hoc Networks”,
International Journal of Innovation, Management and
Technology, Vol. 1, No. 3, 279-285, August 2010.
[6] Gary Breed Editorial Director, “Wireless Ad-Hoc
Networks: Basic Concepts”, High Frequency
Electronics, March 2007.
[7] Hongmei Deng, Wei Li, and Dharma P. Agrawal,
“Routing Security in Wireless Ad Hoc Networks”
IEEE Communications Magazine • October 2002
[8] Mohseni, S.; Hassan, R.; Patel, A.; Razali, R,
“Comparative review study of reactive and proactive
routing protocols in MANETs”, 4th IEEE International
Conference on Digital Ecosystems and Technologies,
304-309, 2010.
[9] Humayun Bakht, “Survey of Routing Protocols for
Mobile Ad-hoc Network”, International Journal of
Information and Communication Technology
Research, 258-270, October 2011.
[10] Mohit Kumar and Rashmi Mishra “An Overview of
MANET: History, Challenges and Applications”,
Indian Journal of Computer Science and Engineering
(IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
[11] C. Perkins, E. Belding-Royer and S. Das, “Ad-Hoc
On-Demand Distance Vector (AODV) Routing”,
RFC3561, July 003.
[12] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc
Wireless Networks, Architectures and Protocols”, Low
Price Edition, Pearson Education, 2007, pp. 521.
[13] Dokurer, Semih.”Simulation of Black hole attack in
wireless Ad-hoc networks”. Master's thesis, Atilim
University, September 2006.
[14] Payal N. Raj, Prashant B. Swadas. “DPRAODV: A
Dynamic Learning System against Black hole Attack
in AODV Based MANET”, IJCSI International
Journal of Computer Science Issues, 2:54-59, 2009.
[15] Oscar F. Gonzalez, God win Ansa, Michael Howarth
and George Pavlou. “Detection and Accusation of
Packet Forwarding Misbehavior in Mobile Ad-Hoc
networks”, Journal of Internet Engineering, 2:1, 2008.
[16] Emmanouil A. Panaousis, Levon Nazaryan, Christos
Politis,”Securing AODV Against Wormhole Attacks
in Emergency MANET Multimedia Communications”,
Mobimedia’09, September 7-9, 2009, London, UK. [17] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone,
“Handbook of Applied Cryptography”, CRC Press,
1996.