Security issues in routing protocols in MANETs at network layer

Abstract MANET stands for “Mobile Ad Hoc Network”. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A MANET is a type of ad hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks To accommodate the changing topology special routing algorithms are needed. There is no single protocol that fits all networks perfectly. The protocols have to be chosen according to network characteristics, such as density, size and the mobility of the nodes.There is still ongoing research on mobile ad hoc networks and the research may lead to even better protocols and will probably face new challenges. Current goal of this paper is to find out the security Issues and their Countermeasures that are adopted on the Network Layer. Network security extends computer security, thus all the things in computer security are still valid, but there are other things to consider as well. Computer security is defined as follows: -Broadly speaking, security is keeping anyone from doing things you do not want them to do to, with, or from your computers or any peripherals. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.

[1]  H. T. Mouftah,et al.  A comparative study of on-demand and cluster-based routing protocols in MANETs , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[2]  Xiaoyan Hong,et al.  Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[3]  Qingting Wei,et al.  Efficiency Evaluation and Comparison of Routing Protocols in MANETs , 2008, 2008 International Symposium on Information Science and Engineering.

[4]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[5]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[6]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[7]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[8]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .