Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Comparative Analysis of Attacks and Countermeasure in MANET  
  Authors : Puneet Kamal; Rajeev Sharma; Abhishek Gupta
  Cite as:

 

Security is a key issue to ensure protected communication between mobile intersections in adversary environments. Unlike cable networks, it creates some non-leakage issues, such as the unique features of mobile ad hoc networks (MANETs), secure peer-topeer network architecture, shared wireless interference, harsh resource restrictions, and high dynamic network topology. These difficulties create a hub for creating a multifunctional security solution to achieve extensive protection and performance of any network. In this article, we pay attention to the main security problem of MANET. We identify security issues with the discussed issues a security design is also discussed. A review of the latest security recommendations for MANETalong with the performance is discussed.

 

Published In : IJCSN Journal Volume 8, Issue 2

Date of Publication : April 2019

Pages : 177-181

Figures :02

Tables : 04

 

Puneet Kamal : M.Tech (Research Scholar), Chandigarh Engineering College, Landran, Mohali, India.

Rajeev Sharma : Assistant Professor, Chandigarh Engineering College, Landran, Mohali, India.

Abhishek Gupta : Assistant Professor, Chandigarh Engineering College, Landran, Mohali, India.

 

MANET, Routing, Security Criteria, Attacks, Security solution

Due to the dynamic infrastructure of MANET that worked without centralized management, this kind of network is more vulnerable to many attacks. In this article, we discuss the security issues and the different types of routing protocols in MANET.An attempt was made to provide an overview of a few available security attacks in MANET.This network needs to be safer and strengthened to suit the requirements of the network. In this article, research on MANET safety is still a challenge and opens the door for researchers. Also, a comparison between existing prevention techniques has been performed. From the analysis, it has been observed that when an artificial intelligence technique is used with intrusion detection system the detection rate of the network has been increased.

 

[1] M. Usman, M. A. Jan, X. He, & P. Nanda, "QASEC: A secured data communication scheme for mobile Adhoc networks," Future Generation Computer Systems. 2018. [2] I. Naz, S. Bashir, & S. Abbas, "Secure Routing in Mobile Ad hoc Network," Sukkur IBA Journal of Computing and Mathematical Sciences, Vol. 2, No. 2, 2018, pp. 14-21. [3] A. K. Gupta, & S. Prakash , "Secure communication in cluster-based ad hoc networks: a review," In Next- Generation Networks , Springer, Singapore, 2018, pp. 537-545). [4] F. Mohammed, C. Badr, & E. Abdellah, "Comparative study of routing protocols in MANET," In 2014 International Conference on Next Generation Networks and Services (NGNS) , 2014, pp. 149-153). [5] P. Goyal, S. Batra, & A. Singh, "A literature review of security attack in mobile ad-hoc networks," International Journal of Computer Applications, Vol. 9, No.12, 2010, pp. 11-15. [6] H. Sargolzaey, A. A. Moghanjoughi, & S. Khatun, "A review and comparison of reliable unicast routing protocols for mobile ad hoc networks," IJCSNS International Journal of Computer Science and Network Security, Vol. 9, No.1, 2009, pp. 186-196. [7] O. O. Obi, "Security issues in mobile ad-hoc networks: a survey," The 17 th White House Papers Graduate Research In Informatics at Susse, 2004. [8] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, & A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless communications, Vol. 14, No. 5, 2007, pp. 85-91. [9] M. C. Trivedi, Yadav, S., & Singh, V. K, "Securing ZRP Routing Protocol Against DDoS Attack in Mobile Ad Hoc Network,"In Advances in Data and Information Sciences , Springer, Singapore, 2019, pp. 387-396. [10] P. M. Jawandhiya, M. M. Ghonge, M. S. Ali, & J. S. Deshpande, "A survey of mobile ad hoc network \ attacks.," International Journal of Engineering Science and Technology, Vol.2, No.9, 2010, pp.4063-4071. [11] E. A. Shams, & A. Rizaner, "A novel support vector machine based intrusion detection system for mobile ad hoc networks," Wireless Networks, Vol.24, No.5, 2018, pp.1821-1829. [12] B. Sen, M. G. Meitei, K. Sharma, M. K. Ghose, & S. Sinha, "A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET," In Advanced Computational and Communication \ Paradigms , Springer, Singapore, 2018, pp. 765-775 . [13] E. Ahmed, K. Samad, &, W. Mahmood, "Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks," In 5th Conference, AusCERT2006 Gold Coast, Australia, May 2006 Proceedings. [14] N. Dang, &, P. Mittal, "Cluster based intrusion detection system for MANETS," International Journal of Computer Applications & Information Technology, Vol.1, No.1, 2012.. [15] D. B. Roy, R. Chaki, & N. Chaki, "A new cluster-based wormhole intrusion detection algorithm for mobile adhoc networks," International Journal of Network Security & Its Applications Vol.1, No. 1, 2009, pp.44- 52. [16] N. S. Raote, "Defending wormhole attack in wireless ad-hoc network," International Journal of Computer Science & Engineering Survey, Vol. 2, No. 3, 2011, pp. 143-148. [17] R. A. Sowah, K. B. Ofori-Amanfo, G. A. Mills, & K. M. Koumadi, "Detection and Prevention of Man- inthe- Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)," Journal of Computer Networks and Communications, Vol. 2019, pp. 1-14.