Security Issues in Mobile Ad Hoc Networks

Abstract In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wired networks ensure the secured communications. But, in the case of wireless mobile ad hoc networks, the nodes are dynamic and the topology based and also needs more power consumptions. Because of mobility in wireless mobile adhoc networks, also there are lots of vulnerabilities when the attackers wish to collapse the partial or entire networks. Hence, there are lots of requirement for an understanding of the various problems associated with the wireless mobile networks. In this paper, the various vulnerabilities, attacks and security mechanisms are discussed for mobile ad hoc networks (MANETs) in detail.

[1]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Chris J. Mitchell,et al.  Security Vulnerabilities in Ad Hoc Networks , 2003 .

[4]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  J. Parker,et al.  Cross-layer analysis for detecting wireless misbehavior , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[7]  Refik Molva,et al.  Security in wireless ad hoc networks , 2003 .

[8]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[9]  Yongguang Zhang,et al.  Security in Mobile Ad-Hoc Networks , 2005 .

[10]  Sok Sien. Choy,et al.  Security in mobile ad hoc networks , 2000 .

[11]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[12]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .