Survey on Mobile Ad Hoc Network Attacks and Mitigation Using Routing Protocols

Mobile Ad hoc Networks (MANET) due to its unpredictable topology and bandwidth limitations are vulnera ble to attacks. Establishing security measures and find ing secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node a uthentication, insider attack and intrusion detecti on. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitig ate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modificati on of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection . This study studied various approaches to predict and mit igate attacks in MANET.

[1]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[2]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[5]  A. Tamilarasi,et al.  An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks , 2011 .

[6]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[7]  V. Madhu Viswanatham,et al.  An Approach for Detecting Attacks in Mobile Adhoc Networks , 2008 .

[8]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[13]  N. Bhalaji,et al.  A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks , 2008 .

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[16]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[17]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[18]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).