A system level security for Mobile Ad hoc Networks

Mobile Ad hoc Networks (MANETs) always bring challenges to the designers in terms of its security deployment due to its dynamic and infrastructure less nature. In the past few years different researchers have proposed different solutions for providing security to MANETs. In most of the cases however, the solution is targeting a particular attack or multiple attacks but fails to find the root cause of it. In this paper we use system level security for deploying the overall security in MANETs. The system level security is the security at node level as we believe that if nodes behave properly and in a coordinated fashion, the insecurity level will go drastically down. Our simulation results gives the advantage of using this approach

[1]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[2]  S.A. Khan,et al.  Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.

[3]  Samir R Das,et al.  Ad hoc on-demand multipath distance vector routing , 2002, MOCO.

[4]  Hsing-Chung Chen,et al.  A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[5]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[6]  Rajendra V. Boppana,et al.  Crosscheck mechanism to identify malicious nodes in ad hoc networks , 2009, Secur. Commun. Networks.

[7]  Djamel Djenouri,et al.  Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[9]  Neelima Gupta,et al.  SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks , 2008, 2008 The Fourth International Conference on Wireless and Mobile Communications.

[10]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.