ABSTRACT
A mobile ad hoc network (MANET) is an infrastructure-less network of various mobile devices and generally known for its self configuring behavior. MANET can communicate over relatively bandwidth constrained wireless links. Due to limited bandwidth battery power and dynamic network, topology routing in MANET is a challenging issue. Collaborative attacks are particularly serious issues in MANET. Attacks are liable to occur if routing algorithms fail to detect prone threats and to find as well as remove malicious nodes. Our objective is to examine and improve the performance of network diminished by variety of attacks. The performance of MANET network is examined under Black hole, Wormhole and Sybil attacks using Performance matrices and then major issues which are related to these attacks are addressed.
- M. Al-Shurman, S.-M. Yoo, and S. Park. Black hole attack in mobile ad hoc networks. In Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pages 96--97, New York, NY, USA, 2004. ACM. Google ScholarDigital Library
- K. Biswas, M. L. Ali, K. Biswas, M. L. Ali, and R. Gustavsson. Security threats in mobile ad hoc network. Master's thesis, Blekinge Institute of Technology, Sweden, 2007.Google Scholar
- Y. chun Hu. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003,, San Francisco, CA, USA, 2003.Google ScholarCross Ref
- H. Deng, W. Li, and D. P. Agrawal. Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10):70--75, Oct 2002. Google ScholarDigital Library
- J. R. Douceur. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pages 251--260, London, UK, UK, 2002. Springer-Verlag. Google ScholarDigital Library
- M. KS and G. Aghila. Article: A survey on black hole attacks on aodv protocol in manet. International Journal of Computer Applications, 34(5):23--30, November 2011. Full text available.Google Scholar
- R. Maulik and N. Chaki. A comprehensive review on wormhole attacks in manet. In 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), pages 233--238, Oct 2010.Google ScholarCross Ref
- R. Maulik and N. Chaki. A study on wormhole attacks in manet. International Journal of Computer Information Systems and Industrial Management Applications, IJCISIM, 2011.Google Scholar
- A. Nadeem and M. Howarth. Adaptive intrusion detection & prevention of denial of service attacks in manets. In Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC '09, pages 926--930, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- P. Papadimitratos and Z. J. Haas. Securing the internet routing infrastructure. IEEE Communications Magazine, 40(10):60--68, Oct 2002. Google ScholarDigital Library
- G. A. PequeÃśo, J. R. Rivera, and S. A. Kassler. Extension to mac 802.11 for performance improvement in manet. Master's thesis, Karlstads University, Sweden, 2006.Google Scholar
- M. Pirretti, S. Zhu, V. Narayanan, P. Mcdaniel, M. K, and R. Brooks. The sleep deprivation attack in sensor networks: Analysis and methods of defense. International Journal of Distributed Sensor Networks, 2(3):267--287, 2006.Google ScholarCross Ref
- Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks
Recommendations
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
A Mobile Ad hoc Network MANET is a collection of wireless computers nodes communicating over multi-hop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic ...
Wormhole attacks in wireless networks
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is ...
Two-Level Secure Re-routing (TSR) in Mobile Ad Hoc Networks
MNCAPPS '12: Proceedings of the 2012 International Conference on Advances in Mobile Network, Communication and Its ApplicationsThe lack of static infrastructure, open nature and node mobility causes several issues in Mobile Ad Hoc Network (MANET), such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme, Two-level Secure Re-...
Comments