Security in Mobile ADHOC Networks: Survey

被引:5
|
作者
Kariyannavar, Sharat S. [1 ]
Thakur, Shreyas [1 ]
Maheshwari, Aastha [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Engn, Delhi, India
关键词
Mobile ADHOC Networks; Routing protocols; Attacks in MANET; Blackhole; Gray Hole; Jellyfish; Worm Hole; Rushing; Sybil attacks; mitigation techniques; WORMHOLE ATTACKS;
D O I
10.1109/ICICT50816.2021.9358611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Adhoc Networks (MANETs) are dynamic, flexible, and mobile. While they enjoy several advantages over traditional wireless networks due to these characteristics, their lack of infrastructure leaves them susceptible to a plethora of security threats. To better understand these threats, the traits of MANETs are elucidated and their vulnerable features are brought to light. Subsequently, the paper classifies and differentiates security attacks into various categories on several bases. Here, Data Traffic attacks, which directly affect the information being transmitted over the network, and Control Traffic attacks, which affect the flow of traffic in a network, are the primary focus. Examples of each of these attacks are explained with their functioning. Research work regarding the same have been studied and most effective countermeasures are mentioned. This paper aims to concisely summarize existing excellent research to defog uncertainties regarding the practical implementation of MANETs.
引用
收藏
页码:135 / 143
页数:9
相关论文
共 50 条
  • [1] Adaptive Security for Multilevel Adhoc Networks - A Survey
    Mahboob, Tahira
    Fatima, Samman
    Atta, Zunaira
    2016 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE), 2016, : 1 - 6
  • [2] Security Issues in Mobile Adhoc Network: A Survey Paper
    Sharma, Vishnu
    Vij, Akansha
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 561 - 566
  • [3] SURVEY OF STABLE CLUSTERING FOR MOBILE ADHOC NETWORKS
    Akbari, Abolfazle
    Soruri, Mandi
    Jalali, Seyed Vahid
    2009 SECOND INTERNATIONAL CONFERENCE ON MACHINE VISION, PROCEEDINGS, ( ICMV 2009), 2009, : 3 - +
  • [4] Survey on Routing Protocols on Mobile Adhoc Networks
    Mohandas, Geethu
    Silas, Salaja
    Sam, Shini
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 514 - 517
  • [5] Diverse Security Intimidation and Disputes in Mobile Adhoc Networks
    Lakshminarasimha, Kasetty
    Subramanyam, M. V.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 546 - 550
  • [6] Security Assessment of Routing Protocols in Mobile Adhoc Networks
    Soni, Megha
    Joshi, Brijendra Kumar
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [7] A Low Rate DDoS: A Security Threat in Mobile Adhoc Networks
    Sunitha, M. S.
    Abrar, Sayyid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 1 - 3
  • [8] Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
    Govindan, Kannan
    Mohapatra, Prasant
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 279 - 298
  • [9] An effective implementation of security based algorithmic approach in mobile adhoc networks
    Singh, Rajinder
    Singh, Parvinder
    Duhan, Manoj
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2014, 4 (01) : 1 - 14
  • [10] Improving performance of Adhoc TCP in Mobile Adhoc Networks
    Gajjar, Sachin
    Gupta, Hari M.
    PROCEEDINGS OF THE INDICON 2008 IEEE CONFERENCE & EXHIBITION ON CONTROL, COMMUNICATIONS AND AUTOMATION, VOL I, 2008, : 144 - +