Security is a key issue to ensure protected communication between mobile intersections in adversary environments. Unlike
cable networks, it creates some non-leakage issues, such as the unique features of mobile ad hoc networks (MANETs), secure peer-topeer
network architecture, shared wireless interference, harsh resource restrictions, and high dynamic network topology. These
difficulties create a hub for creating a multifunctional security solution to achieve extensive protection and performance of any network.
In this article, we pay attention to the main security problem of MANET. We identify security issues with the discussed issues a security
design is also discussed. A review of the latest security recommendations for MANETalong with the performance is discussed.
Published In:IJCSN Journal Volume 8, Issue 2
Date of Publication : April 2019
Pages : 177-181
Figures :02
Tables : 04
Puneet Kamal :
M.Tech (Research Scholar),
Chandigarh Engineering College, Landran, Mohali, India.
Rajeev Sharma :
Assistant Professor,
Chandigarh Engineering College, Landran, Mohali, India.
Abhishek Gupta :
Assistant Professor,
Chandigarh Engineering College, Landran, Mohali, India.
Due to the dynamic infrastructure of MANET that
worked without centralized management, this kind of
network is more vulnerable to many attacks. In this
article, we discuss the security issues and the different
types of routing protocols in MANET.An attempt was
made to provide an overview of a few available security
attacks in MANET.This network needs to be safer and
strengthened to suit the requirements of the network. In
this article, research on MANET safety is still a
challenge and opens the door for researchers. Also, a
comparison between existing prevention techniques has
been performed. From the analysis, it has been observed
that when an artificial intelligence technique is used with
intrusion detection system the detection rate of the
network has been increased.
[1] M. Usman, M. A. Jan, X. He, & P. Nanda, "QASEC: A
secured data communication scheme for mobile Adhoc
networks," Future Generation Computer Systems.
2018.
[2] I. Naz, S. Bashir, & S. Abbas, "Secure Routing in
Mobile Ad hoc Network," Sukkur IBA Journal of
Computing and Mathematical Sciences, Vol. 2, No. 2,
2018, pp. 14-21.
[3] A. K. Gupta, & S. Prakash , "Secure communication in
cluster-based ad hoc networks: a review," In Next-
Generation Networks , Springer, Singapore, 2018, pp.
537-545).
[4] F. Mohammed, C. Badr, & E. Abdellah, "Comparative
study of routing protocols in MANET," In 2014
International Conference on Next Generation Networks
and Services (NGNS) , 2014, pp. 149-153).
[5] P. Goyal, S. Batra, & A. Singh, "A literature review of
security attack in mobile ad-hoc
networks," International Journal of Computer
Applications, Vol. 9, No.12, 2010, pp. 11-15.
[6] H. Sargolzaey, A. A. Moghanjoughi, & S. Khatun, "A
review and comparison of reliable unicast routing
protocols for mobile ad hoc networks," IJCSNS
International Journal of Computer Science and Network
Security, Vol. 9, No.1, 2009, pp. 186-196.
[7] O. O. Obi, "Security issues in mobile ad-hoc networks:
a survey," The 17 th White House Papers Graduate
Research In Informatics at Susse, 2004.
[8] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, &
A. Jamalipour, "A survey of routing attacks in mobile
ad hoc networks," IEEE Wireless communications, Vol.
14, No. 5, 2007, pp. 85-91.
[9] M. C. Trivedi, Yadav, S., & Singh, V. K, "Securing
ZRP Routing Protocol Against DDoS Attack in Mobile
Ad Hoc Network,"In Advances in Data and Information
Sciences , Springer, Singapore, 2019, pp. 387-396.
[10] P. M. Jawandhiya, M. M. Ghonge, M. S. Ali, & J. S.
Deshpande, "A survey of mobile ad hoc network \
attacks.," International Journal of Engineering Science
and Technology, Vol.2, No.9, 2010, pp.4063-4071.
[11] E. A. Shams, & A. Rizaner, "A novel support vector
machine based intrusion detection system for mobile ad
hoc networks," Wireless Networks, Vol.24, No.5, 2018,
pp.1821-1829.
[12] B. Sen, M. G. Meitei, K. Sharma, M. K. Ghose, & S.
Sinha, "A Trust-Based Intrusion Detection System for
Mitigating Blackhole Attacks in MANET,"
In Advanced Computational and Communication \
Paradigms , Springer, Singapore, 2018, pp. 765-775 .
[13] E. Ahmed, K. Samad, &, W. Mahmood, "Cluster-based
intrusion detection (CBID) architecture for mobile ad
hoc networks," In 5th Conference, AusCERT2006 Gold
Coast, Australia, May 2006 Proceedings.
[14] N. Dang, &, P. Mittal, "Cluster based intrusion
detection system for MANETS," International Journal
of Computer Applications & Information
Technology, Vol.1, No.1, 2012..
[15] D. B. Roy, R. Chaki, & N. Chaki, "A new cluster-based
wormhole intrusion detection algorithm for mobile adhoc
networks," International Journal of Network
Security & Its Applications Vol.1, No. 1, 2009, pp.44-
52.
[16] N. S. Raote, "Defending wormhole attack in wireless
ad-hoc network," International Journal of Computer Science & Engineering Survey, Vol. 2, No. 3, 2011, pp.
143-148.
[17] R. A. Sowah, K. B. Ofori-Amanfo, G. A. Mills, & K.
M. Koumadi, "Detection and Prevention of Man- inthe-
Middle Spoofing Attacks in MANETs Using
Predictive Techniques in Artificial Neural Networks
(ANN)," Journal of Computer Networks and
Communications, Vol. 2019, pp. 1-14.