Surveying Solutions to Securing On-Demand Routing Protocols in MANETs

A Mobile ad hoc Network or MANET is a wireless network of mobile devices that has the ability to self-configure and self-organise and is characterised by an absence of centralised administration and network infrastructure. An appreciable number of routing protocols used in a typical MANET have left the critical aspect of security out of consideration by assuming that all of its constituent nodes are trustworthy and non-malicious. In this paper, we discuss some of the major threats that such networks are vulnerable to, because of these inherently insecure protocols. The focus is specifically on the source-initiated and on-demand routing protocols. Further, solutions and modifications to these protocols that have been proposed over time, enabling them to mitigate the aforementioned threats to some extent, are also analysed.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[3]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[4]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[5]  Vijay Varadharajan,et al.  Packet Drop Attack: A Serious Threat to Operational Mobile Ad hoc Networks , 2005 .

[6]  Dr Pradip M. Jawandhiya A Survey of Mobile Ad Hoc Network Attacks , 2019 .

[7]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[8]  Ying Wang,et al.  A method for security enhancements in AODV protocol , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[9]  Prabha Ramachandran,et al.  Limitations of on demand secure routing protocols , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[10]  Sugata Sanyal,et al.  An LSB Data Hiding Technique Using Prime Numbers , 2007, Third International Symposium on Information Assurance and Security.

[11]  John Marshall,et al.  An Analysis Of The Secure Routing Protocol For Mobile Ad Hoc Network Route Discovery: Using Intuitiv , 2003 .

[12]  Marco Gruteser,et al.  Detecting Identity Spoofs in 802 . 11 e Wireless Networks , 2009 .

[13]  Futai Zou,et al.  A Survey on Security in Wireless Mesh Networks , 2010 .

[14]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[15]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[16]  Sehun Kim,et al.  A Sinkhole Detection Method based on Incremental Learning in Wireless Ad Hoc Networks , 2007 .

[17]  Sugata Sanyal,et al.  A distributed security scheme for ad hoc networks , 2004, CROS.

[18]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[19]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[20]  Guillermo Alonso Pequeño,et al.  Extension to MAC 802.11 for performance improvement in MANET , 2007 .

[21]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[22]  Alessandro Neri,et al.  A Generalized Fibonacci LSB Data Hiding Technique , 2006 .

[23]  Nei Kato,et al.  A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006 .

[24]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[25]  Preeti Nagrath,et al.  Analyzing security of Authenticated Routing Protocol (ARAN) , 2010 .

[26]  M. K. Soni,et al.  A Comparative Study for Secure Routing in MANET , 2010 .

[27]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.

[28]  Pramod Kumar Soni,et al.  A Survey of Mobile Ad Hoc Network Attacks , 2013 .

[29]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[30]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[31]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.

[32]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[33]  Levent Ertaul,et al.  Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.

[34]  V. Sankaranarayanan,et al.  Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .

[35]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[36]  Pla Uni,et al.  Secure Routing for Mobile Ad hoc Networks , 2005 .

[37]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[38]  Z. Hasan A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .

[39]  Security Scheme for ad-hoc Networks , 2005 .