Network Layer Attacks and Defense Mechanisms in MANETS- A Survey

The foremost concerned security issue in mobile ad hoc networks is to protect the network layer from malicious attacks, thereby identifying and preventing malicious nodes. A unified security solution is in very much need for such networks to protect both route and data forwarding operations in the network layer. Without any appropriate security solution, the malicious nodes in the network can readily act to function as routers. This will solely disturb the network operation from correct delivering of the packets, like the malicious nodes can give stale routing updates or drop all the packets passing through them. In this paper a study that will through light on such attacks in MANETS is presented. The paper also focuses on different security aspects of network layer and discusses the effect of the attacks in detail through a survey of approaches used for security purpose.

[1]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[2]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[3]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[4]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[5]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[6]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[7]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[8]  Robin Kravets,et al.  Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[9]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[10]  A. Field Communications , 1963, The Journal of Asian Studies.

[11]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[14]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[15]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[16]  Horst Ehmke,et al.  Internet and Intranet , 1997 .

[17]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[18]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[19]  Godwin Ansa,et al.  Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks , 2008 .

[20]  Neelima Gupta,et al.  Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET) , 2007, Sixth International Conference on Networking (ICN'07).

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[22]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[23]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[24]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[25]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[26]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[27]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[28]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[29]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[30]  Christos Politis,et al.  Securing AODV against wormhole attacks in emergency MANET multimedia communications , 2009, MobiMedia.

[31]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .