Research Article

Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review

by  Monika, Mukesh Kumar, Rahul Rishi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Issue 2
Published: December 2010
Authors: Monika, Mukesh Kumar, Rahul Rishi
10.5120/1649-2218
PDF

Monika, Mukesh Kumar, Rahul Rishi . Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review. International Journal of Computer Applications. 12, 2 (December 2010), 37-43. DOI=10.5120/1649-2218

                        @article{ 10.5120/1649-2218,
                        author  = { Monika,Mukesh Kumar,Rahul Rishi },
                        title   = { Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 12 },
                        number  = { 2 },
                        pages   = { 37-43 },
                        doi     = { 10.5120/1649-2218 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Monika
                        %A Mukesh Kumar
                        %A Rahul Rishi
                        %T Article:Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review%T 
                        %J International Journal of Computer Applications
                        %V 12
                        %N 2
                        %P 37-43
                        %R 10.5120/1649-2218
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying infrastructure such as base station or mobile switching centers. Basically ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. In a mobile ad hoc network, it is much more vulnerable to attacks than a wired network due to its limited physical security, dynamically changing network topology, energy constrained operations and lack of centralized administration. Since all the nodes in the network collaborate to forward the data, the wireless channel is prone to active and passive attacks by malicious nodes, such as Denial of Service (DoS), eavesdropping, spoofing, etc. The intent of this paper is to investigate the security goal, security challenges and different types of active and passive attacks on MANETs.

References
  • B.G.KIN, “The Quality of Service in The Internet” ,IEEE,0-7803-7093-7/0.
  • T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. SivaRam Murthy.”Quality Of Service Provisioning In Ad Hoc Wireless Networks: A Survey of Issues And Solutions. AdHoc Networks” , Ad Hoc NetworksVol.4, pp. 83–124,
  • Shakeel Ahmed A K Ramani, “Exploring the Requirementsfor QoS in Mobile Ad hoc Networks” Journal of Information & Communication Technology, Vol. 1 No. 2,01-09 , (Fall 2007).
  • IETF MANET Working Group. Mobile Ad Hoc Networks (MANET). Working Group, Charter available at http://www.ietf.org/html.charters/manet-charter.html
  • Sannella, M. Ilyas, “The Handbook of Ad Hoc Wireless Networks,” CRC Press, 2003.
  • Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
  • Kostas Papadopoulos, Theodore Zahariadis, Nelly Leligou, Stamatis Voliotis,” Sensor Networks Security Issues In Augmented Home Environment”, IEEE. ISBN: 978-1-4244-2422-1.
  • L. Zhou, Z.J. Haas, Cornell Univ., “Securing ad hoc networks,” IEEE Network, Nov/Dec 1999, Volume: 13, Page(s): 24-30, ISSN: 0890-8044..
  • Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
  • Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. Security in mobile ad hoc networks Challenge and solution. IEEE wireless communication, 11, 1, (2004), 38-47.
  • Hubaux J.-P., Buttyan L., Capkun S., “The Quest for Security in Mobile Ad Hoc Networks”, In Proc. of the 2nd
  • B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Department of Computer Science and Engineering, Florida Atlantic niversityhttp://student.fau.edu/jchen8/web/papers/SurveyBookchapter.pdf
  • Sonja Buchegger and Jean-Yves Le Buddec, “Increasing Routing Security in Mobile ad hoc Network,” IBM Research Report: RR 3354, 2001 ACM Int. Symp. on Mobile Ad hoc Networking & Computing, pp. 146-155, 2001
  • H Deng, W. Li, and D. Agrawal, Routing Security in Wireless Ad Hoc Networks.IEEE Communications Magazine. Vol. 40, No. 10, 2002
  • K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

MANETs Security Mobility Attack Vulnerable

Powered by PhDFocusTM