Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey of Network Layer attacks and Security Mechanisms and Solutions for Routing Protocols in MANET

Fouziah M. Hamza, Vijay Kumar Tripathi

Abstract


A Mobile Ad-Hoc Network (MANET) is a collection of mobile nodes communicating in a multi hop way without any fixed infrastructure such as access points or base stations. Security has become important to mobile ad hoc networks (MANETs) due mainly to their use by military forces or for emergency rescue situations. The nature and structure of MANET makes it attractive to various types of attackers. There are also attacks that target some particular routing protocols such as DSR, or AODV. Achieving secure routing protocols resistant to multiple attacks remains a challenging task. Several efforts have been made toward the design of a secure and robust routing protocol for ad hoc network. In this paper we examine and classify major routing attacks which are specified in the literature and analyze some of the state-of –the art mechanisms and proposed secure ad hoc routing protocols that satisfy specific security requirements. A Comparison between these protocols can provide the basis for future research in this rapidly evolving area.

Keywords


MANET, SAR, SEAD, SAODV, SRP

Full Text:

PDF

References


M. Abolhasan, T. Wysocki and E. Dutkiewicz: A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, (1).2: p. 1-22 (2004).

C. E. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for Mobile Computers, SIGCOMM’94 Conf.on Communications Architectures, Protocols and Applications,Aug. 1994, pp. 234-244.

T.H. Clausen, G. Hansen, L.Christensen, and G.Behrmann, The optimized link state protocol, Evaluation through Experiments and Simulation, Proc. Of IEEE Symp. On Wireless Personal Mobile Communications 2001, Sep. 2001.

C. E. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” Experimental RFC 3561,Internet Engineering Task Force (IETF), July 2003.

D. Johnson, Y. Hu, and D. Maltz, “The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4,”Experimental RFC 4728, Internet Engineering Task Force (IETF), February 2007.

Z. J. Hass, M.R. Pearlman and P.Samar: “The zone routing protocol (ZRP) for ad hoc networks," IETF MANET Working Group, (2002).

W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd edition, Prentice Hall, 2003

S. Burnett and S. Paine, RSA Security’s Official Guide to Cryptography, RSA Press, 2001.

F. Nait- Abdesselam, B.Bensaou, and T. Taleb. “Detecting and avoiding wormhole attack in wireless ad hoc networks “, IEEE Communication Magaz, Vol 46, no. 4, pp.127-33, Apr. 2003.

J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks: analysis &defences, Proc. of the 3rd Intl. Symp. On Information Processing in Sensor Networks, 2004.

J. Barkley, NIST Special Publication: Symmetric Key Cryptography,http://csrc.nist.gov/publications/nistpubs/800-7/node208. html

R. Kravets, S. Yi, and P. Naldurg, Security-aware routing protocol for wireless Ad hoc Networks, In ACM Symp. on Mobile Ad Hoc Networking and Computing, 2001.

Y. C. Hu, D. B. Johnson and A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WM-CSA’02), Jun. 2002.

K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002

P. Papadimitratos and Z. J. Haas, “Secure routing for mobilead hoc Networks,” Proc. Communication Networks and Distributed Systems, Modelling and Simulation Conf. (CNDS’02),San Antonio, Texas, Jan. 2002, pp. 27–31.

Zubair Muhammad Fadlullah, Tarik Taleb, and Marcus Schöller, “Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs)”.

Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom’02, 2002

A. Perrig, R. Canetti, D. Tygar, and D. Song, the TESLA broadcast authentication protocol, RSA Cryptobytes (RSA Laboratories), Vol 5, No 2, Summer/Fall 2002, pp. 2-13.

S. Buchegger and J. L. Boudec, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes Fairness In Dynamic Ad-hoc Networks, In Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Net-working and Computing (MobiHOC), Jun. 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.