A Review of Security in Mobile Ad hoc Networks

In mobile ad hoc networks (MANET), the communicating nodes do not rely on fixed infrastructure which results into several challenges. The power and computational resources are limited in these networks, making security requirements different from wired or infrastructured networks. As mobile ad hoc networks use wireless links, the network is susceptible to link attacks ranging from passive eavesdropping to active impersonation, message replay and message dropping. When the nodes are mobile, they not only lack physical security but they can also be compromised easily because there is no central entity in mobile ad hoc networks. In addition, as mobile ad hoc networks are often designed for specific environments for example battlefields, the security solutions applied in traditional networks are not directly suitable for protecting them. This paper reviews various issues and techniques involved in the security of mobile ad hoc networks.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[3]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[4]  Bharat K. Bhargava,et al.  On security study of two distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[5]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[8]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[9]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[10]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[11]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[12]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[13]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[14]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[16]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[17]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[18]  A. Kumar,et al.  Security model for routing attacks in mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[19]  Wayne A. Jansen,et al.  Intrusion detection with mobile agents , 2002, Comput. Commun..

[20]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[21]  Seung Yi,et al.  A Security-Aware Routing Protocol for Wireless Ad Hoc Networks , 2002 .

[22]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[23]  Ivan Stojmenovic,et al.  Mobile Ad Hoc Networking: Basagni/Ad Hoc Networking , 2004 .