Security Threats in MANETS : A Review

Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in a peer-to-peer fashion without involving central access points. Many routing protocols like AODV, DSR etc have been proposed for these networks to find an end to end path between the nodes. These routing protocols are prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely manner before destruction of network services.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  C. V. Raman,et al.  Performance analysis of Dynamic MANET On- demand (DYMO) Routing protocol , 2010 .

[3]  Sylvie Perreau,et al.  A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Toyoo Takata,et al.  An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[6]  Mario Gerla Landmark Routing Protocol (LANMAR) for Large Scale Ad Hoc Networks , 2002 .

[7]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[8]  Vijay Varadharajan,et al.  Fellowship: Defense against Flooding and Packet Drop Attacks in MANET , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[9]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[10]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[11]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[12]  Atul Garg,et al.  Improving Throughput and Delay of Secure Ad hoc on-Demand Distance Vector Routing (SAODV) , 2014 .

[13]  Thomas Clausen,et al.  The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .

[14]  Debdutta Barman Roy,et al.  Prevention of sleep deprivation attacks using clustering , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[15]  Fred L. Templin,et al.  Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.

[16]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[17]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[18]  Pascal Lorenz,et al.  A Cross layer Admission Control On-demand Routing Protocol for QoS Applications , 2006 .

[19]  M. Pushpalatha,et al.  Performance Analysis of Flooding Attack Prevention Algorithm in MANETs , 2009 .

[20]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[21]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[22]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[23]  André Schiper,et al.  Probabilistic broadcast for flooding in wireless mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[24]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.