A Survey of MANET Survivability Routing Techniques

Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support Mobile Ad hoc Network (MANET) survivability in adversarial environment. Survivable of routing operations is the key aspects of the challenge in MANETs because most of destructive attacks classified as active attacks and all are intent to attack MANET routing operation to prevent it from providing it services in a right time. In this paper, we will discuss the most effective and practical initiatives have designed to keep MANET survive in an adversarial environment and how it supporting MANET availability.

[1]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[3]  Yanjun Zuo A Framework of Survivability Requirement Specification for Critical Information Systems , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[4]  Guy Pujolle,et al.  Survival multipath routing for MANETs , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[5]  Klara Nahrstedt,et al.  Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..

[6]  Fenguangzhai Song CD , 1992 .

[7]  Arobinda Gupta,et al.  Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey , 2010 .

[8]  Guy Pujolle,et al.  Requirements for survivable routing in MANETs , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Geng Peng,et al.  Routing Attacks and Solutions in Mobile Ad hoc Networks , 2006, 2006 International Conference on Communication Technology.

[11]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[12]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[13]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[14]  Abhay Kumar Rai,et al.  Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .

[15]  Nancy R. Mead,et al.  Requirements definition for survivable network systems , 1998, Proceedings of IEEE International Symposium on Requirements Engineering: RE '98.

[16]  Abdullah Saad Al Shahrani Rushing Attack in Mobile Ad Hoc Networks , 2011, INCoS.

[17]  Mohammad S. Obaidat,et al.  Fault and intrusion tolerance in wireless ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[18]  Zygmunt J. Haas,et al.  Path selection algorithms in homogeneous mobile ad hoc networks , 2006, IWCMC '06.

[19]  Reza Curtmola,et al.  On the Survivability of Routing Protocols in Ad Hoc Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[20]  Z. Hasan A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .

[21]  J. Bonney,et al.  Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[22]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[23]  Vrinda Tokekar,et al.  Classification of Denial of Service Attacks in Mobile Ad Hoc Networks , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[24]  Uyen Trang Nguyen,et al.  Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[25]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[26]  Romit Roy Choudhury,et al.  Survivability Analysis of Ad Hoc Wireless Network Architecture , 2000, Mobile and Wireless Communication Networks.

[27]  George K. Papageorgiou,et al.  Cross-Layered Security Analysis of Wireless Ad Hoc Networks , 2004 .

[28]  J.J. Garcia-Luna-Aceves,et al.  An end-to-end solution for secure and survivable routing in MANETs , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.