Approaches for Enhancing the Performance and Security of Mobile Ad Hoc Networks
Citation
Roopa.M , Selvakumar Raja.S. "Approaches for Enhancing the Performance and Security of Mobile Ad Hoc Networks", International Journal of Engineering Trends and Technology (IJETT), V12(10),515-520 June 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
In past few decades the wired network has been migrated to wireless network. The mobility and scalability of wireless network made it possible in many applications.The next stage of advancement was Mobile Ad hoc network (MANET). As compared to the other wireless networks that need a centralized node, fixed network infrastructure and limited coverage range , a MANET does not require a fixed network infrastructure and there is no limitation in perimeter. Here every single node works as both a transmitter and a receiver. The nodes are self-configuring and communicate directly with each other when they are within the same communication range. Otherwise, they rely on their neighbours to relay messages. The open medium, continuous advertisement by a node ,and wide distribution of nodes make MANET vulnerable to malicious attackers. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. . Also due to the distributed nature the identification of the threats becomes difficult. In this paper a survey is made on- types of attacks , intrusion detection system(IDS) , protection mechanisms , prevention techniques, security solutions and vulnerabilities in MANET to reduce the computational complexity during data communication.
References
[1] Harish M, Shweta Vincent, ‘ A Survey on Routing Protocols in MANETS’, International Journal of Computer Science and Management Research Vol 1 Issue 5 December 2012
[2] Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, ‘EAACK—A Secure Intrusion-Detection System for MANETs.’, IEEE Transactions On Industrial Electronics, Vol. 60, No. 3, March 2013.
[3] Michele Nogueira Lima, Aldri Luiz dos Santos, and Guy Pujolle ‘A Survey of Survivability in Mobile Ad Hoc Networks’, IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, First Quarter 2009
[4] Y. Xiao, X. Shen, and D.-Z. Du (Eds.), ‘A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks’, WIRELESS/MOBILE NETWORK SECURITY 2006 Springer
[5] S. Yi and R. Kravets, ‘Composite Key Management for Ad Hoc Networks’,Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services(MobiQuitous’04), pp. 52-61, 2004.
[6] K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, ‘A Secure Routing Protocol for Ad Hoc Networks’, Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
[7] B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, ‘An On-demand Secure Routing Protocol Resilient to Byzantine Failures’, Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
[8]Y. Hu, A. Perrig, and D. Johnson, ‘Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols’. Proc. of the ACM Workshop on Wireless Security (WiSe), pp. 30-40, 2003.
[9]Harish M1 , Shweta Vincent ‘A Survey on Routing Protocols in MANETS’, Department of Computer Science and Engineering, Karunya University, Coimbatore, India International Journal of Computer Science and Management Research
[10]Karim El Defrawy, Member, IEEE, and Gene Tsudik, Senior Member ‘ALARM: Anonymous Location-Aided Routing in Suspicious MANETs’, IEEE Transactions On Mobile Computing, Vol. 10, No. 9, September 2011
[11]Karim El Defrawy, Member, and Gene Tsudik ‘Privacy-Preserving Location-Based On-Demand Routing in MANETs’,Senior Member, IEEE Journal On Selected Areas In Communications, Vol. 29, No. 10, December 2011
[12]Yi-an Huang and Wenke Lee, ‘A Cooperative Intrusion Detection System for Ad Hoc Networks’, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and SensorNetworks, Fairfax, Virginia, 2003
[13]B. Wu, J. Chen, J. Wu, and M. Cardei ‘Wireless/Mobile Network Security’, chapter A survey on attacks and countermeasures in mobile ad hoc networks. Springer, 2006.
[14]P. E. Ver´?ssimo, N. F. Neves, and M. P. Correia ‘Intrusion-Tolerant Architectures: Concepts and Design’, Technical Report DI-FCUL TR-03-5, University of Lisbon, Department of Informatics, University of Lisbon, Portugal, 2003.
[15]Y. Deswarte and D. Powell ‘ Internet Security: An Intrusion-Tolerance Approach’, Proc. IEEE, 94(2):432–441, 2006.
[16]Adnan Nadeem, Member, IEEE, and Michael P. Howarth ‘ A Survey of MANET Intrusion Detection &Prevention Approaches for Network Layer Attacks’, IEEE Communications Surveys & Tutorials, Vol. 15, No. 4, Fourth Quarter 2013
[17]P. Uppuluri and R. Sekar, ‘Experiences with Specification-Based Intrusion Detection,’ Proc. Recent Advances in Intrusion Detection, (RAID),2001.
[18]G.F.Cretu, J.Parekh, K.Wang and S.J.Stolfo, ‘Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks’, Proc. IEEE Consumer Communication And Networking Conference, 2006
References
Mobile Adhoc network , Security, IDS