Details

SECURITY THREATS IN MOBILE AD HOC NETWORK

Ujjal Agarwal

Asstt. Lecturer, AL-MERGIB UNIVERSITY, AL-KHUMS, LIBYA

Prof. K. P. Yadav

Director, SIET, Ghaziabad (UP), India

Upendra Tiwari

Asstt. Prof., SIET, Ghaziabad (UP), India

50-61

Vol: 3, Issue: 4, 2013

Receiving Date: 2013-10-05 Acceptance Date:

2013-11-04

Publication Date:

2013-12-02

Download PDF

Abstract

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

Keywords: Mobile Ad hoc Network, Security Threats, Link Layer, Application Layer, Countermeasure for Security Threats, Traffic, Distributed Coordination Function.

References

  1. S. Capkun, L. Buttyan, and J. Hubaux, “Sector: Secure Tracking of Node Encounters in Multihop Wireless Networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks,” 2003.
  2. H. Deng, W. Li, Agrawal, D.P., “Routing security in wireless ad hoc networks,” Cincinnati Univ., OH, USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804
  3. J.-P. HuBaux, L. Buttyan, and S. Capkun., “The quest for security immobile ad hoc network,” In Proc. ACM MOBICOM, Oct. 2001.
  4. H. Hsieh and R. Sivakumar, “Transport OverWireless Networks,” Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenovic. John Wiley and Sons, Inc., 2002.
  5. Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-Demand Routing for Ad Hoc Networks,” Proc. of MobiCom 2002, Atlanta, 2002.
  6. Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proc. of IEEE INFORCOM, 2002.
  7. IEEE Std. 802.11i/D30, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security,” 2002.
  8. J. Kong et al., “Providing robust and ubiquitous security support for mobile ad-hoc networks,” In Proc. IEEE ICNP, pages 251–260, 2001.
  9. C. Kaufman, R. Perlman, and M. Speciner, “Network Security Private Communication in a Public World,” Prentice Hall PTR, A division of Pearson Education, Inc., 2002
  10. P. Kyasanur, and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” DCC, 2003.
  11. P. Michiardi, R. Molva, “Ad hoc networks security,” IEEE Press Wiley, New York, 2003.
  12. A. Perrig, R. Canetti, J. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,” Internet Draft, 2000.
  13. R. Ramanathan, J. Redi and BBN Technologies, “A brief overview of ad hoc networks: challenges and directions,” IEEE Communication Magazine, May 2002, Volume: 40, page(s): 20- 22, ISSN: 0163-6804
  14. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, “Secure routing protocol for ad hoc networks,” In Proc. of 10th IEEE International Conference on Network Protocols, Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA. 12-15 Nov. 2002, Page(s): 78- 87, ISSN: 1092-1648
  15. B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, Florida Atlantic University,http://student.fau.edu/jchen8/web/papers/SurveyBookchapter.pdf
  16. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume11, Page(s): 38- 47, ISSN: 1536-128439
  17. S. Yi, P. Naldurg, and R. Kravets, “Security-aware ad hoc routing for wireless networks,” In Proc. ACM Mobihoc, 2001.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.