International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 7 - Issue 7, July 2018 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Methods For Detecting Attacks In Mobile/Wireless Ad-Hoc Networks: A Survey

[Full Text]



Wellington Mapenduka



Ad hoc, autonomous, attack, detection, intrusion, MANET, vulnerability.



Use of Mobile/Wireless ad hoc networks (MANET) is growing mostly in situations there is need for temporary data exchange such as in emergency services, conference meetings, virtual classrooms due to their low cost and easy in setting up, since they are infrastructure-less. However none existence of centralized administration of standard support services, dynamic topology, and air interface makes them highly vulnerable to attacks. The autonomous nature of the network results in security solutions being implemented mainly at the nodes, which are resource constrained i.e. limited computing power and memory, low bandwidth, and low battery life, thereby limiting the tightness of these solutions. It is extremely important to have flexible and robust methods of detecting attacks and their sources looking at the diversity of MANET application areas, so that appropriate countermeasures can be put in place. Detection based schemes can be incorporated to complement prevention techniques implemented in the network protocols. These methods should work through the whole protocol stack since attacks target specific layers. This paper discusses MANET attacks detection methods that are currently in use taking note of their performance. In the paper we also suggest a hybrid cross layer approach capable of detecting more than one known and new attacks, which can be researched on to complement existing methods in building effective security solutions for MANET.



[1] N. Raza, M.U. Aftab, M.Q Akbar, O. Ashraf, and M. Irfan, ”Mobile Ad-Hoc Networks Applications and Its Challenges,” Communications and Network, Vol 8, pp 131-136, (2016). http://dx.doi.org/10.4236/cn.2016.83013.

[2] S. Kumar and K. Dutta, “Intrusion Detection in Mobile Ad-Hoc Networks: Techniques, Systems and Future Challenges,” Wiley Online Library, Vol 9 Issue14, pp 2484-2556. http://doi.org/10.1002/sec1434 (2010).

[3] S. Kaushal and R. Aggarwal, “A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 4 Issue 2, February 2015.

[4] APR. da Silva, MH. Martins, BP Rocha, AA Loureiro, LB Ruiz, and HC Wong, “Decentralized intrusion detection in wireless sensor networks,” In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Montreal, Quebec, Canada, pp 16-23, October 2005.

[5] R. Verma, and M. Mannan, “A Review on Various Approaches for Attack Detection in MANET,” International Journal of Science and Research (IJSR), Vol 5, Issue 1, pp 873-876, January 2016.

[6] A.M. Holkar, N.S. Holkar, and D. Nitnawwre, “Investigative analysis of repudiation attack on MANET with different routing protocols,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 3, pp 356-359, May – June 2013.

[7] M. Seyyedtaj and M.A.J. Jamali, “Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network,” International Journal of Computer Applications Technology and Research, Volume 3– Issue 9, pp 541 - 546, 2014.

[8] K. Geetha, “SYN Flooding Attacks in Mobile Ad hoc Networks,” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), pp 5033-5037, 2014.
[9] C. Gupta1 , P. Singh, and R. Tiwari, “Network and Transport Layer Attacks in Ad-hoc Network,” International Journal of Advanced Research in Computer and Communication Engineering: ICACTRP 2017, Noida Institute of Engineering & Technology, Greater Noida Vol. 6, Special Issue 2, February 2017.

[10] K. Geetha and N. Sreenath, “Mitigation of session hijacking in mobile ad hoc networks,” International Journal of Applied Engineering Research, Vol 10(14), pp 34281-34287, January 2015.

[11] F. Tseng, L. Chou and H Chao, “A Survey of Black Hole Attacks in Wireless Mobile Ad Hoc Networks,” Human-centric Computing and Information Sciences, https://doi.org/10.1186/2192-1962-1-4, November 2011.

[12] S.Bhalodiya, and K. Vaghela, “Enhanced Detection and Recovery from Flooding Attack in MANETs using AODV Routing Protocol,” International Journal of Computer Applications (0975 – 8887), Volume 125 – No.4, September 2015.

[13] R Meher and S Ladhe, ”Review Paper on Flooding Attack in MANET,” International Journal of Engineering Research and Applications, pp. 39- 46, January 2014.

[14] S.R. Venna1, and R.B. Inampudi, “A Survey on Security Attacks in Mobile Ad Hoc Networks,” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (1), pp. 135-140, 2016.

[15] M El Houssainia, A Aarouda, A El Horea, and J Ben-Othman, “Detection of Jamming Attacks in Mobile Ad Hoc Networks using Statistical Process Control,” The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Procedia Computer Science 83 ( 2016 ) pp 26 – 33.

[16] S Upadhyay and A Bajpai, “Avoiding Wormhole Attack in MANET using Statistical Analysis Approach,” International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.1, pp 15-23, March 2012.

[17] AT Preeti, “Exclusion of Denial of Service Attack using Graph Theory in MANETS,” International Research Journal of Engineering and Technology (IRJET), Volume (04) Issue (07), pp 3394-3399, July -2017.

[18] R Venkataraman, M. Pushpalatha, TR Rao and R Khemka, “A Graph-Theoretic Algorithm for Detection of Multiple Wormhole Attacks in Mobile Ad Hoc Networks,” International Journal of Recent Trends in Engineering, Vol. 1, No. 2, pp 220-222, May 2009.

[19] M Imrana, FA Khanb, T Jamala and MH Durada, “Analysis of Detection Features for Wormhole Attacks in MANETs,” International Workshop on Cyber Security and Digital Investigation (CSDI 2015), pp 384 – 390, Procedia Computer Science 56 (2015).

[20] M Nachammai and N. Radha, “An Improved Trust Based Approach For Detecting Malicious Nodes in MANET,” International Journal of Computer Trends and Technology (IJCTT), Volume 41 Number 1, pp 54-58, November 2016.