International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 6 - Issue 1, January 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Collective Study On Security Threats In MANET

[Full Text]



Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan



Mobile Ad hoc Network MANET, Destination Sequence Distance Vector DSDV, Dynamic Source routing DSR, Ad-hoc on demand distance vector AOD , Truster Mobile Node TrMN, Associated Trusted Mobile Node (ATMn), Trusted Mobile Node (TdMN), Secure temporarily ordered routing Protocol STOP, Cluster based trust aware routing protocol (CBTRP), Intrusion detection system (IDS), Network intrusion detection systems (NIDS), System integrity verifiers (SIV), Log file monitors (LFM).



In this paper the authors will be discussing the security issues in MANET & the methods to protect it. Authors will be talk about related work in securing the network, different type of attacks, how to sense these sorts of attack, what are the features of MANET, then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET, inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested, So that the users can use proper authentication techniques and network resources can be properly utilized.



[1] H. Safa, H. Artail and D. Tabet, "A cluster-based trust-aware routing protocol for mobile ad hoc networks," Wirel.Netw., vol. 16, pp. 969-984, may, 2010.

[2] G. Raju and R. Akbani, "Mobile ad hoc networks security," Proceedings of Annual Review of Communications, vol. 58, pp. 635-628, 2005.

[3] S. Kannan, T. Maragatham, S. Karthik and V. Arunachalam, "A Study of Attacks, Attack Detection and Prevention Methods in Proactive and Reactive Routing Protocols," International Business Management, vol. 5, pp. 178-183, 2011.

[4] D. Djenouri, L. Khelladi and N. Badache, "A survey of security issues in mobile ad hoc networks," IEEE Communications Surveys, vol. 7, 2005.

[5] S. Şen, J. A. Clark and J. E. Tapiador, "Security Threats in Mobile Ad Hoc Networks," .

[6] A. Ahmed, A. Hanan, A. Shukor and M. Izzeldin, "MANET Security Schemes," .

[7] N. Balachandran, "Surveying Solutions to Securing On-Demand Routing Protocols in MANETs," ArXiv Preprint arXiv:1207.0758, 2012.

[8] J. Forné, J. Muoz, O. Esparza and F. Hinarejos, "Certificate status validation in mobile ad hoc networks," Wireless Communications, IEEE, vol. 16, pp. 55-62, 2009.

[9] M. Yu, M. Zhou and W. Su, "A secure routing protocol against byzantine attacks for MANETs in adversarial environments," IEEE Transactions on Vehicular Technology, vol. 58, pp. 449, 2009.

[10] Y. Li and J. Wei, "Guidelines on selecting intrusion detection methods in MANET," in The 21st Annual Conference for Information Systems Educators (ISECON), Rhode Island, USA, 2004, pp. 4-7.

[11] V. Manoj, N. Raghavendiran, M. M. Aaqib and R. Vijayan, "An approach for detection of malicious node using fuzzy based trust levels in MANET," in Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011, pp. 477-480.

[12] S. Dabideen and J. Garcia-Luna-Aceves, "Secure routing in MANETs using local times," Wireless Networks, pp. 1-16, 2012.

[13] G. K. Patnaik and M. Gore, "Trustworthy path discovery in MANET--A message oriented cross-correlation approach," in Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on, 2011, pp. 170-177.

[14] V. Manchikalapudi, S. Yelisetti and R. K. Surapaneni, "Detecting misbehavior nodes and trust levels in manets," in Engineering Education: Innovative Practices and Future Trends (AICERA), 2012 IEEE International Conference on, 2012, pp. 1-4.

[15] L. Abusalah, A. Khokhar and M. Guizani, "A survey of secure mobile ad hoc routing protocols," Communications Surveys & Tutorials, IEEE, vol. 10, pp. 78-93, 2008.

[16] S. Joshi and D. K. Mishra, "A survey on threats in routing security in manet for trust management using SMC protocols," in Wireless and Optical Communications Networks (WOCN), 2012 Ninth International Conference on, 2012, pp. 1-6.