Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  The Comparative Study of Security Mechanism in Mobile Ad-hoc Networks  
  Authors : Balamurugan G,; Somasundaram R; Sumithra K
  Cite as:

 

Security mechanism in wireless ad-hoc networks is a highly a challenging concern. Security in the MANET communication network is significant for secure transmission of information. Many security mechanisms for mobile ad-hoc network (MANET) have been proposed in the day to day events. Absence of any central co-ordination mechanism and shared wireless medium makes MANET more susceptible to cyber attacks than wired network there are a number of attacks that affect MANET. In MANET, all networking functions such as routing and packet distribution are performed by nodes in a self organizing manner. Due to these reasons, securing a Mobile Adhoc Network is very challenging.

 

Published In : IJCSN Journal Volume 3, Issue 6

Date of Publication : December 2014

Pages : 514 - 520

Figures : 05

Tables : 01

Publication Link : Enterprise Resource Planning for College Administration

 

 

 

BALAMURUGAN G : M.Tech., student in a stream of Computer Science & Engineering at Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India.

SOMASUNDARAM R : M.Tech., student in a stream of Computer Science & Engineering at Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India.

SUMITHRA K : M.Tech., student in a stream of Computer Science & Engineering at Manakula Vinayagar Institute of Technology, Pondicherry University, Pondicherry, India.

 

 

 

 

 

 

 

MANET

Security mechanism

rushing attack

black hole attack

neighbor attack and jellyfish attack

Maintaining of dynamic topology and the distributed operation on MANET is more vulnerable to many attacks. In this paper, we discuss various types of security attacks and its function. Different security mechanisms are introduced in order to prevent MANET and also identify the type of attack which has been occurred in the MANET.

 

 

 

 

 

 

 

 

 

[1] Priyanka Goyal, Vinti Parmar and Rahul Rishi, “MANET: Vulnerabilities, Challenges, Attacks, Application”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011. [2] Gaga deep, Aashima and Pawan Kumar “Analysis of Different Security Attacks in MANETs on Protocol Stack”. International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012 [3] Mohammad Wazid, Rajesh Kumar Singh and R. H. Goudar, “A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques “International Journal of Computer Applications® (IJCA) International Conference on Computer Communication and Networks CSI- COMNET2011. [4] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “ A survey of black hole attacks in wireless mobile ad hoc networks” Human-centric Computing and Information Sciences 2011 [5] Sunil Taneja and Ashwani Kush, “ A Survey of Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, 279-285, August 2010. [6] Gary Breed Editorial Director, “Wireless Ad-Hoc Networks: Basic Concepts”, High Frequency Electronics, March 2007. [7] Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks” IEEE Communications Magazine • October 2002 [8] Mohseni, S.; Hassan, R.; Patel, A.; Razali, R, “Comparative review study of reactive and proactive routing protocols in MANETs”, 4th IEEE International Conference on Digital Ecosystems and Technologies, 304-309, 2010. [9] Humayun Bakht, “Survey of Routing Protocols for Mobile Ad-hoc Network”, International Journal of Information and Communication Technology Research, 258-270, October 2011. [10] Mohit Kumar and Rashmi Mishra “An Overview of MANET: History, Challenges and Applications”, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012. [11] C. Perkins, E. Belding-Royer and S. Das, “Ad-Hoc On-Demand Distance Vector (AODV) Routing”, RFC3561, July 003. [12] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks, Architectures and Protocols”, Low Price Edition, Pearson Education, 2007, pp. 521. [13] Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”. Master's thesis, Atilim University, September 2006. [14] Payal N. Raj, Prashant B. Swadas. “DPRAODV: A Dynamic Learning System against Black hole Attack in AODV Based MANET”, IJCSI International Journal of Computer Science Issues, 2:54-59, 2009. [15] Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”, Journal of Internet Engineering, 2:1, 2008. [16] Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis,”Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications”, Mobimedia’09, September 7-9, 2009, London, UK. [17] A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.