Security challenges in mobile ad hoc networks: a survey

MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.

[1]  Raed A. Alsaqour,et al.  Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET , 2011, ICSECS.

[2]  Nai-Wei Lo,et al.  A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .

[3]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[4]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[5]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[6]  Byrav Ramamurthy,et al.  An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2006, MSN.

[7]  Sanjeev Rana,et al.  Security-Aware Efficient Route Discovery for DSR in MANET , 2010, ICT.

[8]  Ming Li,et al.  Enabling secure and reliable policy-based routing in MANETs , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[9]  Sanjay Agrawal,et al.  A Proposed Solutionfor Security Issues In MANETs , 2013 .

[10]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[11]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[12]  Anuj K. Gupta,et al.  A Comprehensive Review of Security Issues in Manets , 2013 .

[13]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[14]  F. Richard Yu,et al.  Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..

[15]  Sanjay Keer,et al.  To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[16]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[17]  Xixiang Lv,et al.  Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks , 2013, IET Inf. Secur..

[18]  Yahui Yang,et al.  Policy-Based Time Slot Assignment algorithm in a MANET(PBTSA) , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[19]  Rajneesh Gujral,et al.  Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETS , 2010, BAIP.

[20]  Jian Su,et al.  Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network , 2011, ICAIC.

[21]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[22]  H. Vincent Poor,et al.  Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.

[23]  Tarek N. Saadawi,et al.  IEEE 802.11 Denial of Service attack detection in MANET , 2012, Wireless Telecommunications Symposium 2012.

[24]  Srihari Nelakuditi,et al.  Pair-wise resistance to traffic analysis in MANETs , 2008, MOCO.

[25]  Mehdi Berenjkoub,et al.  A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks , 2008 .

[26]  Michael P. Howarth,et al.  Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.

[27]  Merin Achankunju,et al.  Particle swarm optimization based secure QoS clustering for mobile ad hoc network , 2013, 2013 International Conference on Communication and Signal Processing.

[28]  Syed Rehan Afzal,et al.  RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[29]  Ankur Mishra,et al.  A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[30]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[31]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[32]  Pallavi Kaliyar,et al.  A secure routing protocol for MANETs against byzantine attacks , 2013 .

[33]  P T Tharani,et al.  SECURED CONSISTENT NETWORK FOR COPING UP WITH FABRICATION ATTACK IN MANET , 2013 .

[34]  Xu Huang,et al.  Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.

[35]  Manju Khari,et al.  Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey , 2012 .

[36]  P. Subathra,et al.  Establishment of stable certificate chains for authentication in mobile ad hoc networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[37]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[38]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[39]  Jalel Ben-Othman,et al.  Defending method against jamming attack in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[40]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[41]  S. Radha,et al.  A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[42]  S. Bose,et al.  Impact of Gray hole attack on adhoc networks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[43]  A. El-Sayed Clustering Based Group Key Management for MANET , 2013, SecNet.

[44]  Emmanouil A. Panaousis,et al.  Secure routing for supporting ad-hoc extreme emergency infrastructures , 2010, 2010 Future Network & Mobile Summit.

[45]  F. De Rango,et al.  EE-OLSR: Energy Efficient OLSR routing protocol for Mobile ad-hoc Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[46]  Arputharaj Kannan,et al.  Enhanced intrusion detection techniques for mobile ad hoc networks , 2007 .

[47]  K. Vishnu A new kind of transport layer attack in wireless Ad Hoc Networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[48]  Chen Wei,et al.  A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[49]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[50]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[51]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[52]  Palaniandavar Venkateswaran,et al.  Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks , 2011 .

[53]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[54]  Khaleel Ur Rahman Khan,et al.  Integrating Mobile Ad Hoc Networks and the Internet: challenges and a review of strategies , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[55]  Zhifeng Zhao,et al.  Availability based trust model of clusters for MANET , 2010, 2010 7th International Conference on Service Systems and Service Management.

[56]  Durgesh Kumar Mishra,et al.  Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[57]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[58]  Hyoung-Kee Choi,et al.  A Secure and Lightweight Approach for Routing Optimization in Mobile IPv6 , 2009, EURASIP J. Wirel. Commun. Netw..

[59]  Shiyong Zhang,et al.  Distributed Intrusion Detection for Mobile Ad Hoc Networks , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).

[60]  Mohsen Guizani,et al.  A Fuzzy-Based Hierarchical Energy Efficient Routing Protocol for Large Scale Mobile Ad Hoc Networks (FEER) , 2006, 2006 IEEE International Conference on Communications.

[61]  B. Parvathavarthini,et al.  An efficient cluster based key management scheme for MANET with authentication , 2010, Trendz in Information Sciences & Computing(TISC2010).

[62]  Nei Kato,et al.  On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.

[63]  Isabelle M. Demeure,et al.  Transhumance: A platform on a Mobile Ad hoc NETwork challenging collaborative gaming , 2008, 2008 International Symposium on Collaborative Technologies and Systems.