Security attacks and detection schemes in MANET

A Mobile adhoc network (MANET) is considered a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. MANET is particularly vulnerable due to its fundamental characteristics, such as open peer-to-peer architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology and nodes openness to physical capture. Security is most important service for all kind of network communications. MANET should provide security that increases people's confidence on MANET. In this paper a survey on MANET attacks and detection schemes are presented. This helps to understand different types of attacks and detection schemes required to avoid those attacks.

[1]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[4]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[5]  Winston Khoon Guan Seah,et al.  Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..

[6]  Xue Liu,et al.  Research on multicast routing protocols for mobile ad-hoc networks , 2008, Comput. Networks.

[7]  Nei Kato,et al.  Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[8]  Madjid Merabti,et al.  Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.

[9]  Xizhao Wang,et al.  Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[10]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[11]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[12]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[13]  Baban A. Mahmood Routing and Security in Mobile Ad Hoc Networks , 2016 .

[14]  M. Phil. A Survey of Routing Attacks in Manet , 2015 .

[15]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[16]  Ruoyu Wu,et al.  Risk-Aware Mitigation for MANET Routing Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[17]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[18]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[19]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[20]  Tadeusz A. Wysocki,et al.  Scalability of MANET routing protocols for heterogeneous and homogenous networks , 2010, Comput. Electr. Eng..

[21]  K. Selvakumar,et al.  Eaack- A Secure Intrusion Detection System for Manets , 2015 .

[22]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[23]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[24]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[25]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[26]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.