a study of routing attacks in wireless mobile adhoc networks

N. Elamathi,

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:1         Issue:2         Year: 18 May,2015         Pages:143-152

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

Security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this paper, describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types

Kewords

Ad hoc network, MANET, AODV, OLSR

Reference

[1] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication,” International Journal of Computer Science and Security (IJCSS) Volume: 4 Issue: 3. [2] Sukla Banerjee , “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA. [3] Y.C. Hu, A. Perrig, and D.B.Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Network,” Proc. 22nd Annual Joint Conf. IEEE Computer and Communication Societies San Francisco, CA, April 2003. [4] K. Sanzgiriet al., ―A Secure Routing Protocol for Ad Hoc Networks, Proc. 2002 IEEE Int’l. Conf. Network Protocols, Nov. 2002. [5] Y-C. Hu, A. Perrig, and D. B. Johnson, ―Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,‖ Proc. MobiCom ’02, Atlanta, GA, Sept. 23–28, 2002. [6] M. G. Zapata and N. Asokan, ―Securing Ad-Hoc Routing Protocols, Proc. 2002 ACM Wksp. Wireless Sec., Sept. 2002, pp. 1–10. [7] B. Wu et al., ―A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless/Mobile Network Security, Springer, vol. 17, 2006. [8] Amitabh Misgra and Ketan M. Nadkarni, “Security in Wireless Ad hoc Networks”, in Book The Handbook of Ad hoc Wireless Networks(Chpter 30),CRC Press LLC, 2003. [9] Lidong Zhou, Zygmunt J. Haas:,” Securing Ad hoc Networks”,IEEE Network Magzine, 13, 6, Pages 24-30, 1999.