A survey of security issues in mobile ad hoc and sensor networks

@article{Djenouri2005ASO,
  title={A survey of security issues in mobile ad hoc and sensor networks},
  author={Djamel Djenouri and Lyes Khelladi and Nadjib Badache},
  journal={IEEE Communications Surveys \& Tutorials},
  year={2005},
  volume={7},
  pages={2-28}
}
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment… Expand
Exploration of security threats and its performance impact on Mobile Ad-Hoc Networks using NS-2
TLDR
A classification of MANet security threats based on protocol layers of network, security goals, behaviors, timings is presented and a quantitative evaluation of impact of one of these attacks on an insecure on-demand routing protocol using simulation is performed. Expand
Security attacks and IDS solutions in Mobile Ad Hoc networks
Mobile ad hoc networks (MANETs) are wireless networks established by autonomous nodes without the aid of any established infrastructure. In MANETs, the nodes themselves implement the networkExpand
Possible Solutions of Different Security Issues and Challenges in Mobile Ad-Hoc Networks (MANETs)
Today, the rising concern for flexible infrastructure services is a call for advanced researches in the emergence of 'Mobile Ad hoc Network'. It is a key technology that supports various ultramodernExpand
A survey of key management in ad hoc networks
TLDR
The state of the art within key management for ad hoc networks is surveyed, and their applicability for network-layer security is analyzed, as this work was initiated by a study of security in MANETs for emergency and rescue operations. Expand
Study and Analysis on Security of Ad - Hoc Networks
TLDR
This study analyses the vulnerabilities of MANETs and describes various protection schemes that had been developed to overcome those and analyses shortcoming and vulnerabilities of those protection schemes. Expand
Dynamic Topology Control In Manet's To Mitigate Spam Attacks Using Secure Communication Protocols.
Security is the main concern and bottleneck for widely deployed wireless applications due to the fact that wireless channels are vulnerable to attacks and that wireless bandwidth is a constrainedExpand
A new security scheme for on-demand source routing in mobile ad hoc networks
TLDR
A secure routing scheme using the self-certified public key cryptosystem, elliptic curve cryptos system, pre-hashing, and nonce techniques against such attacks in ENDAIRA is designed. Expand
Hybrid Intrusion Detection for Wireless Sensor Networks
In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the majorExpand
Sensor network security: a survey
TLDR
This paper identifies the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first, and gives a holistic overview of security issues. Expand
Authenticated Routing for Ad-Hoc On-Demand Distance Vector Routing Protocol
TLDR
A method that is based on ad hoc on-demand routing (AODV) protocol and can efficiently prevent the attacks from member of the network including black hole, modifying routing information and impersonation attacks is proposed. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 133 REFERENCES
A cooperative intrusion detection system for ad hoc networks
TLDR
This paper investigates how to improve the anomaly detection approach to provide more details on attack types and sources and addresses the run-time resource constraint problem using a cluster-based detection scheme where periodically a node is elected as the ID agent for a cluster. Expand
Securing ad hoc networks
TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework. Expand
Secure data transmission in mobile ad hoc networks
TLDR
The Secure Message Transmission (SMT) protocol is presented and evaluated, which safeguards the data transmission against arbitrary malicious behavior of other nodes and is better suited to support QoS for real-time communications in the ad hoc networking environment. Expand
Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols
  • F. Anjum, D. Subhadrabandhu, S. Sarkar
  • Computer Science
  • 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
  • 2003
TLDR
The signature detection technique is considered and the ability of various routing protocols to facilitate intrusion detection when the attack signatures are completely known is investigated, showing that reactive ad-hoc routing protocols suffer from a serious problem due to which it might be difficult to detect intrusions even in the absence of mobility. Expand
A secure routing protocol for ad hoc networks
TLDR
This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Expand
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints. Expand
Rushing attacks and defense in wireless ad hoc network routing protocols
TLDR
The rushing attack is presented, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols, and Rushing Attack Prevention (RAP) is developed, a generic defense against the rushing attack for on- demand protocols. Expand
Self-organized network-layer security in mobile ad hoc networks
TLDR
This paper describes the unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding functionalities in the context of the AODV protocol. Expand
The quest for security in mobile ad hoc networks
TLDR
An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described. Expand
Cross-feature analysis for detecting ad-hoc routing anomalies
TLDR
A new data mining method is introduced that performs "cross-feature analysis" to capture the inter-feature correlation patterns in normal traffic to detect deviation (or anomalies) caused by attacks in MANET. Expand
...
1
2
3
4
5
...