Security Issues in Mobile Ad Hoc Networks: A Survey
@inproceedings{Kumar2016SecurityII, title={Security Issues in Mobile Ad Hoc Networks: A Survey}, author={Sunil Kumar and Kamlesh Dutta}, year={2016} }
In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that…
Figures from this paper
115 Citations
A Study of Attack on Wireless Ad-Hoc Network
- Computer Science
- 2019
The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks, and presents the main attack categories that exist in it.
MANET security: A survey
- Computer Science2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014)
- 2014
A review of the current threats and how these threats are mitigated on mobile ad hoc networks and classifies these attacks in various classification types is provided.
An Overview of Security in MANET
- Computer Science
- 2017
The paper presents the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks, and the main attack types that exist in it.
Security: A Core Issue in Mobile Ad hoc Networks
- Computer Science
- 2015
This paper shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis ofnetwork attacks, and propose solutions to meet the security challenges.
A Review: Security Issues in Mobile Ad Hoc Network
- Computer Science
- 2014
Characteristics, attacks and security in mobile ad-hoc network are discussed, which consist of decentralized wireless mobile nodes connected through each other with a wireless medium forming rapidly changing topologies.
A Study on Security Concepts in Mobile Ad Hoc Network
- Computer Science
- 2015
Security issues in detail are discussed and security issues associated with mobile ad hoc networks which are required in order to provide secure communication are discussed.
An Efficient Security Approach in Mobile Ad Hoc Networks
- Computer Science
- 2014
An efficient security approach in mobile ad hoc networks will be described in this research and performance and evaluation for the proposed approach will be analyses.
Security Vulnerability and Counter Measures in Mobile Ad-Hoc Networks
- Computer Science
- 2020
A study of some of the security issues that militate against ad hoc network technology design, deployment and operation and possible counter measures required to overcome these challenges are presented.
An Effective Security Approach in Mobile Ad Hoc Networks Using Linked Lists
- Computer Science
- 2015
An efficient security approach in mobile ad hoc networks using linked lists will be described in this paper.
Securing Mobile Ad Hoc Networks: Challenges and Solutions
- Computer ScienceInt. J. Handheld Comput. Res.
- 2016
The intent of this paper is to provide structured and comprehensive study of prominent security attacks reported in the literature for mobile ad hoc networks and various well-known reactive and proactive security solutions proposed in literature to prevent those attacks in MANETs.
References
SHOWING 1-10 OF 182 REFERENCES
The quest for security in mobile ad hoc networks
- Computer ScienceMobiHoc '01
- 2001
An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described.
Attacks against mobile ad hoc networks routing protocol
- Computer Science
- 2004
It is identified that most of the attacks against ad hoc networks routing protocols are actually launched by exploiting the routing messages, and further classify them based upon the techniques that could be used to exploit routing messages in Section IV.
Security Issues in Mobile Ad Hoc Network
- Computer ScienceWireless Networks and Security
- 2013
This chapter Reviews the security problem in MANET provides an updated account of the security solutions for MANET with detailed discussions on secure routing, intrusion detection system and key management problems.
Security in mobile ad hoc networks: challenges and solutions
- Computer ScienceIEEE Wirel. Commun.
- 2004
The security issues related to this problem are identified, the challenges to security design are discussed, and the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel are reviewed.
A secure routing protocol for ad hoc networks
- Computer Science10th IEEE International Conference on Network Protocols, 2002. Proceedings.
- 2002
This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Securing ad hoc networks
- Computer ScienceIEEE Netw.
- 1999
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks
- Computer Science2008 International Seminar on Future Information Technology and Management Engineering
- 2008
A two folded approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network.
Black hole attack in mobile Ad Hoc networks
- Computer ScienceACM-SE 42
- 2004
Computer simulation shows that compared to the original ad hoc on-demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause times at a minimum cost of the delay in the networks.
Security in Mobile Ad-Hoc Networks
- Computer Science
- 2005
Both prevention and detection methods will work together to address the security concerns in MANET and present a few promising research directions.