IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 1, January 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Collective Study On Security Threats In MANET

[Full Text]

 

AUTHOR(S)

Muhammad Zunnurain Hussain, Muhammad Zulkifl Hasan

 

KEYWORDS

Mobile Ad hoc Network MANET, Destination Sequence Distance Vector DSDV, Dynamic Source routing DSR, Ad-hoc on demand distance vector AOD , Truster Mobile Node TrMN, Associated Trusted Mobile Node (ATMn), Trusted Mobile Node (TdMN), Secure temporarily ordered routing Protocol STOP, Cluster based trust aware routing protocol (CBTRP), Intrusion detection system (IDS), Network intrusion detection systems (NIDS), System integrity verifiers (SIV), Log file monitors (LFM).

 

ABSTRACT

In this paper the authors will be discussing the security issues in MANET & the methods to protect it. Authors will be talk about related work in securing the network, different type of attacks, how to sense these sorts of attack, what are the features of MANET, then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET, inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested, So that the users can use proper authentication techniques and network resources can be properly utilized.

 

REFERENCES

[1] H. Safa, H. Artail and D. Tabet, "A cluster-based trust-aware routing protocol for mobile ad hoc networks," Wirel.Netw., vol. 16, pp. 969-984, may, 2010.

[2] G. Raju and R. Akbani, "Mobile ad hoc networks security," Proceedings of Annual Review of Communications, vol. 58, pp. 635-628, 2005.

[3] S. Kannan, T. Maragatham, S. Karthik and V. Arunachalam, "A Study of Attacks, Attack Detection and Prevention Methods in Proactive and Reactive Routing Protocols," International Business Management, vol. 5, pp. 178-183, 2011.

[4] D. Djenouri, L. Khelladi and N. Badache, "A survey of security issues in mobile ad hoc networks," IEEE Communications Surveys, vol. 7, 2005.

[5] S. Şen, J. A. Clark and J. E. Tapiador, "Security Threats in Mobile Ad Hoc Networks," .

[6] A. Ahmed, A. Hanan, A. Shukor and M. Izzeldin, "MANET Security Schemes," .

[7] N. Balachandran, "Surveying Solutions to Securing On-Demand Routing Protocols in MANETs," ArXiv Preprint arXiv:1207.0758, 2012.

[8] J. Forné, J. Muoz, O. Esparza and F. Hinarejos, "Certificate status validation in mobile ad hoc networks," Wireless Communications, IEEE, vol. 16, pp. 55-62, 2009.

[9] M. Yu, M. Zhou and W. Su, "A secure routing protocol against byzantine attacks for MANETs in adversarial environments," IEEE Transactions on Vehicular Technology, vol. 58, pp. 449, 2009.

[10] Y. Li and J. Wei, "Guidelines on selecting intrusion detection methods in MANET," in The 21st Annual Conference for Information Systems Educators (ISECON), Rhode Island, USA, 2004, pp. 4-7.

[11] V. Manoj, N. Raghavendiran, M. M. Aaqib and R. Vijayan, "An approach for detection of malicious node using fuzzy based trust levels in MANET," in Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011, pp. 477-480.

[12] S. Dabideen and J. Garcia-Luna-Aceves, "Secure routing in MANETs using local times," Wireless Networks, pp. 1-16, 2012.

[13] G. K. Patnaik and M. Gore, "Trustworthy path discovery in MANET--A message oriented cross-correlation approach," in Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on, 2011, pp. 170-177.

[14] V. Manchikalapudi, S. Yelisetti and R. K. Surapaneni, "Detecting misbehavior nodes and trust levels in manets," in Engineering Education: Innovative Practices and Future Trends (AICERA), 2012 IEEE International Conference on, 2012, pp. 1-4.

[15] L. Abusalah, A. Khokhar and M. Guizani, "A survey of secure mobile ad hoc routing protocols," Communications Surveys & Tutorials, IEEE, vol. 10, pp. 78-93, 2008.

[16] S. Joshi and D. K. Mishra, "A survey on threats in routing security in manet for trust management using SMC protocols," in Wireless and Optical Communications Networks (WOCN), 2012 Ninth International Conference on, 2012, pp. 1-6.