scispace - formally typeset
Search or ask a question
Author

Venkatesan T. Prasanna

Bio: Venkatesan T. Prasanna is an academic researcher from Anna University. The author has contributed to research in topics: Ad hoc wireless distribution service & Vehicular ad hoc network. The author has an hindex of 1, co-authored 1 publications receiving 20 citations.

Papers
More filters
Proceedings ArticleDOI
08 Sep 2014
TL;DR: In this paper a survey on MANET attacks and detection schemes is presented to understand different types of attacks and Detection schemes required to avoid those attacks.
Abstract: A Mobile adhoc network (MANET) is considered a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. MANET is particularly vulnerable due to its fundamental characteristics, such as open peer-to-peer architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology and nodes openness to physical capture. Security is most important service for all kind of network communications. MANET should provide security that increases people's confidence on MANET. In this paper a survey on MANET attacks and detection schemes are presented. This helps to understand different types of attacks and detection schemes required to avoid those attacks.

20 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This article reports the low-cost implementation of GPS spoofing attack and WiFi attack on UAVs, and suggests solutions to them.
Abstract: Communication security is critically important for the success of Unmanned Aerial Vehicles (UAVs). With the increasing use of UAVs in military and civilian applications, they often carry sensitive information that adversaries might try to get hold of. While UAVs consist of various modules to enable them to function properly, potential security vulnerabilities may also exist in those modules. For example, by launching a GPS spoofing attack or WiFi attack, adversaries can capture the targeted UAV and access the sought after information. In fact, it has become easy to launch such attacks. In this article, we report our low-cost implementation of these attacks and suggest solutions to them.

116 citations

Journal ArticleDOI
TL;DR: This paper provides a survey of attacks related to the wireless infrastructures of IoT, and to the most used short-range wireless communication technologies in the resource-constrained part of IoT in particular, and provides a taxonomy of these attacks based on a security service-based attack classification.
Abstract: The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of wireless and wired networks, geographically distributed and interconnected by a “secured” backbone, essentially, the Internet. It connects billions of heterogeneous devices, called Things, using different communication technologies and provides end-users, all over the world, with a variety of smart applications. IoT constitutes a new evolution for the Internet in terms of diversity, size, and applications. It also invites cybercriminals who exploit IoT infrastructures to conduct large scale, distributed, and devastating cyberattacks that may have serious consequences. The security of IoT infrastructures strongly depends on the security of its wired and wireless infrastructures. Still, the wireless infrastructures are thought to be the most outspread, important, and vulnerable part of IoT. To achieve the security goals in the wireless infrastructures of IoT, it is crucial to have a comprehensive understanding of IoT attacks, their classification, and security solutions in such infrastructures. In this paper, we provide a survey of attacks related to the wireless infrastructures of IoT in general, and to the most used short-range wireless communication technologies in the resource-constrained part of IoT in particular. Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies. The paper also provides a taxonomy of these attacks based on a security service-based attack classification and discusses existing security defenses and mechanisms that mitigate certain attacks as well as the limitations of these security mechanisms.

75 citations

Proceedings ArticleDOI
01 Mar 2016
TL;DR: The major attacks that can target the operation of ad hoc routing protocol are discussed and a detailed survey of the well-known secured ad hoc routed protocols for mobile ad hoc networks is presented.
Abstract: Mobile Ad hoc NETwork (MANET) is a collection of self-organizing mobile nodes without any help of centralized administration or established infrastructure. Due to this characteristic, MANETs are particularly vulnerable to various security threats. In addition, the design of most MANET routing protocols assumes that there is no malicious node in the network. Hence, several efforts and researches have been made toward the design of a secure and robust routing protocol for ad hoc networks. In this paper, we discuss the major attacks that can target the operation of ad hoc routing protocol. A detailed survey of the well-known secured ad hoc routing protocols for mobile ad hoc networks is presented. In order to analyze the existent solutions for securing ad hoc routing protocols in a structured manner, we have classified them into three categories: solutions based on cryptography, solutions based on one-way hash chain and hybrid solutions. This paper also gives a brief summary and comparison of various protocols available for secured routing in MANET.

31 citations

Proceedings ArticleDOI
08 May 2017
TL;DR: A new classification of attacks in MANET is presented according to the principal main factors leading to this attack such as sources of attacks, attacker behavior and involved nodes.
Abstract: The vulnerabilities of Mobile Ad Hoc Networks (MANETs) are subject of numerous kinds of attacks. Many classification schemas and taxonomies of MANET attacks have been proposed in the literature in order to understand the technique of the attack as well as the behavior of attackers. The following paper presents a new classification of attacks in MANET. We distinguish three leading classes of attacks in MANET: In the first class, we make a large analysis of attacks according to the OSI models. In the second, the classification is performed according to the principal main factors leading to this attack such as sources of attacks, attacker behavior and involved nodes. In the third, we performed the analysis according to the target service chosen by the attacker.

21 citations

Proceedings ArticleDOI
15 Jul 2020
TL;DR: A comprehensive survey on various attacks and the proposed solutions by the various researchers and also analysis and comparison of results for the simulated proposed solutions are presented.
Abstract: Vehicular Ad-hoc network (VANET) is a very promising and upcoming technologyusedfor traffic management and for facilitating road safety along with entertainment system. Implementation of VANET requires building trust among the vehicle owners. Without developing trust, it cannot make any vehicle owners to be a part of vehicular network and without active participation of vehicle owners, V ANETs cannot be completely implemented. Therefore, providing security and maintaining the owner's privacy has become a major issue in V ANETs. To provide better security and maintain privacy, one should understand the various possible attacks on the network and the nature of their behavior. Various research papers over the years have discussed about V ANET architecture, Application areas, Challenges and security issues. Most of the papers discuss about the security services and the related work on security but a deeper understanding on each type of attacks on network will help any researcher to develop a security mechanism and the proposed solution can work optimally against one or multiple security attacks. This paper presents a comprehensive survey on various attacks and the proposed solutions by the various researchers and also analysis and comparison of results for the simulated proposed solutions.

15 citations