ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW

Today, usage of mobile ad hoc networks (MANET) has become favorable research subject of study due to their flexibility, mobility and self-sufficiency of network. However, the studies show that as compared to the wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. The widely accepted existing routing protocols designed to accommodate the needs of such selforganized networks do not properly address possible threats aiming at the disruption of the protocol itself. This makes routing attacks particularly serious. In this paper, we consider the modern security issues in MANET. In specific, we investigate routing attacks, such as, Byzantine Attack, Black hole Attack, Rushing Attack and especially Wormhole Attack.

[1]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[2]  Carlos Becker Westphall,et al.  Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[4]  Prodipto Das,et al.  Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Pla Uni,et al.  Secure Routing for Mobile Ad hoc Networks , 2005 .

[8]  John S. Baras,et al.  Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[9]  P. Dananjayan,et al.  Energy Efficient and Secured Cluster Based Routing Protocol for Wireless Sensor Networks , 2011 .

[10]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[11]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[12]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[13]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[14]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[15]  M. GhanaatPisheh Sanaei,et al.  Performance Analysis of SRTLD and BIOSARP Protocols in Wireless Sensor Networks , 2013 .

[16]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[17]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[18]  Majid Bakhtiari,et al.  Performance evaluation of routing protocol on AODV and DSR under wormhole attack , 2013 .

[19]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[20]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[21]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[22]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .