scispace - formally typeset
Search or ask a question
Book ChapterDOI

Security Issues in Mobile Ad Hoc Network

TL;DR: This chapter Reviews the security problem in MANET provides an updated account of the security solutions for MANET with detailed discussions on secure routing, intrusion detection system and key management problems.
Abstract: Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by lack of prior configuration and the hostile environments. Their unique properties make them a natural candidate for situations where unplanned network establishment is required. However this flexibility leads to a number of security challenges. Security in MANET is a very complex job and requires considerations on the issues spanning across all the layers of communication stack. This chapter reviews the security problem in MANET. It provides an updated account of the security solutions for MANET with detailed discussions on secure routing, intrusion detection system and key management problems. The chapter is concluded with a comprehensive security solution for MANET.
Citations
More filters
Journal ArticleDOI
TL;DR: This survey analyzes existing routing protocols and mechanisms to secure routing communications in IoT, as well as the open research issues and analyzes the open challenges and strategies for future research work for a better secure IoT routing.

253 citations

Book ChapterDOI
Sunil Kumar1, Kamlesh Dutta1
01 Jan 2016
TL;DR: The main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network, are analyzed.
Abstract: In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current security solutions for the mobile ad hoc network.

99 citations

Journal ArticleDOI
TL;DR: This review provides an overview of MANet based routing protocols employed for communication during SAR operations and provides taxonomy on communication strategies of MANETs during disaster and emergency situation.
Abstract: Mobile ad hoc networks (MANETs) are defined as a collection of wireless mobile nodes that are characterized as independent, dynamic, self-adaptive and infrastructure less. This mobility and dynamic in nature of MANET urge for new set of networking strategies to be implemented so as to provide efficient communication during natural disaster. Mobile crowd management is yet an emerging new exploration for search and rescue (SAR) operations. The phase of catastrophic management has communication to play a vital role. In MANETs, the end nodes communicate through the TCP/IP protocol. The layers of TCP/IP model change frequently due to mobility and resource overhead. This makes routing in MANETs one of the challenging research area. This review provides an overview of MANET based routing protocols employed for communication during SAR operations. The main purpose of this survey is to provide taxonomy on communication strategies of MANETs during disaster and emergency situation. Furthermore, this paper examines the existing MANET based SAR techniques and the significant contribution made by researches in the past few years based upon routing protocol, communication techniques, type of infrastructure and phase of disaster management.

55 citations

Journal ArticleDOI
TL;DR: Classification of denial of service attack is made and the key differences among black hole, sequence number based gray-hole and smartgray-hole attack are highlighted and it is found that the impact of the smart gray- hole attack is low as compared with the sequence numberbased gray-holes attack.
Abstract: The recent development in wireless communication technology and portable devices has led to the development of Mobile Ad-Hoc Network which has unique features such as dynamic topology, open wireless medium, decentralized system etc but these network are susceptible to various denial of service attacks such as black hole, gray-hole, worm hole etc. In order to mitigate black-hole attack, various protocols have been proposed but these protocols have been not analyzed under gray-hole attack. In this paper, we have made classification of denial of service attack and highlighted the key differences among black hole, sequence number based gray-hole and smart gray-hole attack. We simulated two types of attacks namely Attack1 and Attack2 by modifying AODV protocol. The Attack1 (GAODV) is sequence number based gray-hole attack protocol whereas Attack2 (SGAODV) is smart gray-hole attack protocol. In order to observe the impact of gray-hole attacks on AODV, IDS-AODV and MBDP-AODV, NS-2.35 simulator is used. The simulation results show that MBDP-AODV performs well as compared with IDS-AODV and AODV under sequence number based gray-hole attack. Through simulation, it has also been found that the impact of the smart gray-hole attack is low as compared with the sequence number based gray-hole attack.

37 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: The proposed framework is based on the successful interactions between the IoT sensor nodes, which effectively is a reflection of their trustworthy behavior, and is a lightweight secure trust-based routing framework to identify and isolate common routing attacks in IoT networks.
Abstract: This research proposes a conceptual framework for achieving a secure Internet of Things (IoT) routing that will enforce confidentiality and integrity during the routing process in IoT networks. With billions of IoT devices likely to be interconnected globally, the big issue is how to secure the routing of data in the underlying networks from various forms of attacks. Users will not feel secure if they know their private data could easily be accessed and compromised by unauthorized individuals or machines over the network. It is within this context that we present the design of SecTrust, a lightweight secure trust-based routing framework to identify and isolate common routing attacks in IoT networks. The proposed framework is based on the successful interactions between the IoT sensor nodes, which effectively is a reflection of their trustworthy behavior.

36 citations


Cites background from "Security Issues in Mobile Ad Hoc Ne..."

  • ...This decides the trust limit that a node may have towards its neighbour [4]....

    [...]

References
More filters
Book ChapterDOI
23 Aug 1985
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Abstract: In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. The scheme assumes the existence of trusted key generation centers, whose sole purpose is to give each user a personalized smart card when he first joins the network. The information embedded in this card enables the user to sign and encrypt the messages he sends and to decrypt and verify the messages he receives in a totally independent way, regardless of the identity of the other party. Previously issued cards do not have to be updated when new users join the network, and the various centers do not have to coordinate their activities or even to keep a user list. The centers can be closed after all the cards are issued, and the network can continue to function in a completely decentralized way for an indefinite period.

6,902 citations

Proceedings ArticleDOI
18 Nov 2002
TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Abstract: Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensor-capture detection, key revocation and sensor disabling. In this paper, we present a key-management scheme designed to satisfy both operational and security requirements of DSNs. The scheme includes selective distribution and revocation of keys to sensor nodes as well as node re-keying without substantial computation and communication capabilities. It relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes. The security and network connectivity characteristics supported by the key-management scheme are discussed and simulation experiments presented.

3,900 citations


"Security Issues in Mobile Ad Hoc Ne..." refers background in this paper

  • ...Some approaches were proposed based on pre-distribution of keying information [47]....

    [...]

Book ChapterDOI
26 Sep 2002
TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Abstract: Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities’ collaboration using a technique called reputation. The reputation is calculated based on various types of information on each entity’s rate of collaboration. Since there is no incentive for a node to maliciously spread negative information about other nodes, simple denial of service attacks using the collaboration technique itself are prevented. The generic mechanism can be smoothly extended to basic network functions with little impact on existing protocols.

1,746 citations

Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations


Additional excerpts

  • ...[1]....

    [...]

Journal ArticleDOI
TL;DR: This paper examines the vulnerabilities of wireless networks and argues that it must include intrusion detection in the security architecture for mobile computing environment, and develops a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
Abstract: The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.

808 citations


Additional excerpts

  • ...An example is the system proposed by [51]....

    [...]