Open Access Open Access  Restricted Access Subscription or Fee Access

Security Related Issues in Mobile Ad Hoc Networks

S. Ananthalakshmi, D. Jayakumar, S. Sivachandrian

Abstract


Mobile ad hoc networks (MANETs) are one of the fastest growing areas of research. They are an attractive technology for several applications, such as rescue and planned operations, due to the flexibility provided by dynamic infrastructure. Furthermore, many conservative security solutions used for wired networks are ineffective and inefficient for the highly dynamic and resource- constrained environments. We introduce the security issues specific to MANETs and present a detailed classification of the attackers against these complex distributed systems. Then we discuss various proactive and reactive solutions proposed for MANETs. It then addresses the possible solution to protect the security mechanism, which involves availability, integrity, authentication and nonrepudiation. In this paper, we discuss about security issues and their solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are several security threats that disturb the development of it. We first analyse the main vulnerabilities in the mobile ad hoc networks, which have made it much easily to suffer from attacks than traditional wired network. Finally we survey the current security solutions for the mobile ad hoc network.


Keywords


Mobile Ad Hoc Network, Security, Intrusion Detection, Secure Routing, Infrastructure.

Full Text:

PDF

References


Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.

M. Weiser, the Computer for the Twenty-First Century, Scientific American, September 1991.

Yi P., Dai Z., Zhang S., Zhong Y., “A New Routing Attack in Mobile Ad Hoc Networks”, Int. Journal of Information Technology, vol. 11, No. 2, pp. 83-94, 2005

G.V.S. Raju and Rehan Akbani “Some security Issues in Mobile Ad- hoc Networks” in proceedings of the cutting Edge Wireless and IT Technologies Conference, Nov. 2004.

D. Remondo “Tutorial on Wireless Ad-hoc Networks” HET-NETs ’04: Second International Working Conference in Performance Modelling and Evaluation of Heterogeneous Networks.

H Yang, H.Y.Luo and F.Ye, “Security in Mobile ad hoc Networks: challenges and Solutions” University of California, 2004. IEEE Wireless communications.11 (1), pp 38-47.

Puttini R.S., Percher J-Mr., Me L., Camp O., Sousa Jr. R., Abbas C.J.B., Garcia-Villalba L.J., “A Modular Architecture for Distributed IDS in MANET”, In Proc. of the 2003 Int. Conf. on Computational Science and Its Applications, LNCS 2669, pp. 91-113, Springer, 2003.

Marti S., Giuli T.J., Lai K., Baker M., “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”, In Proc. of ACM Int. Conf. on Mobile Computing and Networking, MOBICOM, pp. 255-265, 2000

Buchegger S., Le Boudec J., “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Network”, In Proc. of Parallel, Distributed and Network-based Processing, pp. 403-410, 2002.

Parker J., Undercoffer J., Pinkston J., Joshi A., “On Intrusion Detection and Response for Mobile Ad Hoc Networks”, In Proc. of 23rd IEEE Int. Performance Computing and Communications.

David Blount, “A study of Mobile Ad-Hoc Network Architectures and Technologies” National University of Ireland, Cork, April 2004 G.V.S. Raju and Rehan Akbani “ Some security Issues in Mobile Ad- hoc Networks” in proceedings of the cutting Edge Wireless and IT Technologies Conference, Nov. 2004.

Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Ad Hoc Networks, 1 (1): 175–192, July 2003.

Y. Hu, A. Perrig and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in Proceedings of IEEE INFOCOM’03, 2003.

Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, in Proceedings of ACM MobiCom Workshop - WiSe’03, 2003.

J. R. Douceur, The Sybil Attack, in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pages 251–260, March 2002, LNCS 2429.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.