A survey of attacks in mobile ad hoc networks

The vulnerabilities of Mobile Ad Hoc Networks (MANETs) are subject of numerous kinds of attacks. Many classification schemas and taxonomies of MANET attacks have been proposed in the literature in order to understand the technique of the attack as well as the behavior of attackers. The following paper presents a new classification of attacks in MANET. We distinguish three leading classes of attacks in MANET: In the first class, we make a large analysis of attacks according to the OSI models. In the second, the classification is performed according to the principal main factors leading to this attack such as sources of attacks, attacker behavior and involved nodes. In the third, we performed the analysis according to the target service chosen by the attacker.

[1]  R. Santhosh Kumar,et al.  DOS Attacks and Defenses at the Network Layer in AD-HOC and Sensor Wireless Networks, Wireless AD-HOC Sensor Networks: A Short Survey , 2015 .

[2]  Dr. S. Karthik,et al.  An Analysis of Various Attacks in MANET , 2014 .

[3]  Chander Diwaker,et al.  ATTACKS ON MOBILE AD-HOC NETWORKS , 2013 .

[4]  Shadi Aljawarneh,et al.  A Conceptual Security Framework for Cloud Computing Issues , 2016, Int. J. Intell. Inf. Technol..

[5]  Shadi Aljawarneh,et al.  Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..

[6]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[7]  Pankaj Gupta,et al.  Attacks Finding and Prevention Techniques in MANET: A Survey , 2015 .

[8]  Kamalrulnizam Abu Bakar,et al.  A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks , 2014, Frontiers of Computer Science.

[9]  Shadi Aljawarneh,et al.  A web engineering security methodology for e-learning systems , 2011, Netw. Secur..

[10]  Yue Wu,et al.  Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.

[11]  Mohamed Rida,et al.  A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[12]  Sarvesh Tanwar Threats & Security Issues in Ad hoc network: A Survey Report , 2013 .

[13]  J. Godwin Ponsam,et al.  A Survey on MANET Security Challenges, Attacks and its Countermeasures , 2014 .

[14]  Ritu Chauhan,et al.  Security Attacks In Mobile Adhoc Networks , 2012 .

[15]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[16]  Peter J. B. King,et al.  Dynamic source routing under attacks , 2015, 2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM).

[17]  Farrukh Aslam Khan,et al.  Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.

[18]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[19]  Shadi Aljawarneh,et al.  Cloud Security Engineering: Avoiding Security Threats the Right Way , 2011, Int. J. Cloud Appl. Comput..

[20]  D. N. Goswami,et al.  An analysis of Security Attacks found in Mobile Ad-hoc Network , 2014 .

[21]  Mayank Singhal,et al.  Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) , 2013 .

[22]  Swapnesh Taterh,et al.  A Study on Various Attacks of TCP/IP and Security Challenges in MANET Layer Architecture , 2014, SocProS.

[23]  Gaurav Kumar Tak,et al.  Comparative Analysis of Various Attacks on MANET , 2015 .

[24]  Sanjeev Thakur,et al.  Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[25]  Ibrihich Ouafaa,et al.  An advanced analysis on secure hierarchical routing protocols in wireless sensor network , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[26]  Noureldien A. Noureldien,et al.  A novel taxonomy of MANET attacks , 2015, 2015 International Conference on Electrical and Information Technologies (ICEIT).

[27]  K. Nirmala,et al.  Security Challenges in Mobile Ad Hoc Networks - A Survey , 2016 .

[28]  P. Rajakumar,et al.  Security attacks and detection schemes in MANET , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).