A survey of security issues in mobile ad hoc and sensor networks

  title={A survey of security issues in mobile ad hoc and sensor networks},
  author={Djamel Djenouri and Lyes Khelladi and Nadjib Badache},
  journal={IEEE Communications Surveys \& Tutorials},
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment… 

Figures and Tables from this paper

Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2

A classification of MANet security threats based on protocol layers of network, security goals, behaviors, timings is presented and a quantitative evaluation of impact of one of these attacks on an insecure on-demand routing protocol using simulation is performed.

Security attacks and IDS solutions in Mobile Ad Hoc networks

This thesis proposes an Intrusion detection engine that is capable of detecting the majority of attacks performed at the MAC layer, which utilizes a specification-based mechanism, although it also uses some threshold based rules.

Possible Solutions of Different Security Issues and Challenges in Mobile Ad-Hoc Networks (MANETs)

A survey of security issues in this dynamic field such as denial of service attack, active and passive attacks, spoofing, eavesdropping, black hole attack, worm hole attack and rushing attack etc is provided.

A survey of key management in ad hoc networks

The state of the art within key management for ad hoc networks is surveyed, and their applicability for network-layer security is analyzed, as this work was initiated by a study of security in MANETs for emergency and rescue operations.

Study and Analysis on Security of Ad - Hoc Networks

This study analyses the vulnerabilities of MANETs and describes various protection schemes that had been developed to overcome those and analyses shortcoming and vulnerabilities of those protection schemes.

Dynamic Topology Control In Manet's To Mitigate Spam Attacks Using Secure Communication Protocols.

This paper presents a secure decentralized clustering algorithm for mobile ad-hoc networks (SADTCA), which operates without a centralized controller, operates asynchronously, and does not require that the location of the modes be known a priori.

A new security scheme for on-demand source routing in mobile ad hoc networks

A secure routing scheme using the self-certified public key cryptosystem, elliptic curve cryptos system, pre-hashing, and nonce techniques against such attacks in ENDAIRA is designed.

Secured Intrusion Detection System in MANET

The EAACK intrusion detection system solves the limitations of receiver collision, limited transmission power and false misbehavior report of earlier system.

Hybrid Intrusion Detection for Wireless Sensor Networks

This paper proposed a hybrid, lightweight intrusion detection system integrated for sensor networks that take advantage of cluster-based protocol to build a hierarchical network and provide an intrusion framework based both on anomaly and misuse techniques.

Sensor network security: a survey

This paper identifies the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first, and gives a holistic overview of security issues.



Securing ad hoc networks

This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.

Secure routing for mobile ad hoc networks

The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.

A cooperative intrusion detection system for ad hoc networks

This paper investigates how to improve the anomaly detection approach to provide more details on attack types and sources and addresses the run-time resource constraint problem using a cluster-based detection scheme where periodically a node is elected as the ID agent for a cluster.

Secure data transmission in mobile ad hoc networks

The Secure Message Transmission (SMT) protocol is presented and evaluated, which safeguards the data transmission against arbitrary malicious behavior of other nodes and is better suited to support QoS for real-time communications in the ad hoc networking environment.

Securing ad hoc routing protocols

A systematology of attacks on a MANET is introduced, and the results of simulations that show, how misbehaving nodes affect MANETs based on the DSR routing protocol are described.

Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols

The signature detection technique is considered and the ability of various routing protocols to facilitate intrusion detection when the attack signatures are completely known is investigated, showing that reactive ad-hoc routing protocols suffer from a serious problem due to which it might be difficult to detect intrusions even in the absence of mobility.

A secure routing protocol for ad hoc networks

This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.


This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.

Rushing attacks and defense in wireless ad hoc network routing protocols

The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols.

Self-organized network-layer security in mobile ad hoc networks

This paper describes the unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding functionalities in the context of the AODV protocol.