scispace - formally typeset
Open Access

A survey of routing attacks in mobile ad hoc networks s ecurity i n w ireless m obile a d h oc a nd s ensor n etworks

TLDR
In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Abstract
Recently, mobile ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in a MANET is a particularly challenging task compared to a conventional network. Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for MANET. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. In MANET, routing attacks are particularly serious. In this article, we investigate the state-of-the-art of security issues in MANET. In particular, we examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Journal ArticleDOI

Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches

TL;DR: A survey on various ML techniques applied to communication, networking, and security parts in vehicular networks and envision the ways of enabling AI toward a future 6G vehicular network, including the evolution of intelligent radio (IR), network intelligentization, and self-learning with proactive exploration.
Journal ArticleDOI

Trust management in wireless sensor networks

TL;DR: The goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities, and to explore the interplay among the implementation requirements, the resource consumption and the achieved security.

Security Vulnerabilities In Wireless Sensor Networks: A Survey

TL;DR: In this article, how WSN differs from wired network and other wireless network and also basic information about the WSN and its security issues compared with wired networkand other wireless networks is discoursed.
Journal ArticleDOI

Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey

TL;DR: This paper presents the recent advances on security threats/attacks and countermeasures in CRNs focusing more on the physical layer by categorizing them in terms of their types, their existence in the CR cycle, network protocol layers, and game theoretic approaches.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Optimized Link State Routing Protocol (OLSR)

TL;DR: The Optimized Link State Routing protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN and provides optimal routes (in terms of number of hops).
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.

Optimized Link State Routing Protocol

TL;DR: Urethane prepolymer compositions are made from 1- isocyanato-3-isocyanatomethyl-3,5,5-trimethyl cyclohexane and polyols at a total NCO to OH ratio of at least 1.2:1, and the prepolymers are reacted with cycloaliphatic polyamines to give urea-urethanes.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Related Papers (5)