Security in Mobile ADHOC Networks: Survey

被引:5
|
作者
Kariyannavar, Sharat S. [1 ]
Thakur, Shreyas [1 ]
Maheshwari, Aastha [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Engn, Delhi, India
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021) | 2021年
关键词
Mobile ADHOC Networks; Routing protocols; Attacks in MANET; Blackhole; Gray Hole; Jellyfish; Worm Hole; Rushing; Sybil attacks; mitigation techniques; WORMHOLE ATTACKS;
D O I
10.1109/ICICT50816.2021.9358611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Adhoc Networks (MANETs) are dynamic, flexible, and mobile. While they enjoy several advantages over traditional wireless networks due to these characteristics, their lack of infrastructure leaves them susceptible to a plethora of security threats. To better understand these threats, the traits of MANETs are elucidated and their vulnerable features are brought to light. Subsequently, the paper classifies and differentiates security attacks into various categories on several bases. Here, Data Traffic attacks, which directly affect the information being transmitted over the network, and Control Traffic attacks, which affect the flow of traffic in a network, are the primary focus. Examples of each of these attacks are explained with their functioning. Research work regarding the same have been studied and most effective countermeasures are mentioned. This paper aims to concisely summarize existing excellent research to defog uncertainties regarding the practical implementation of MANETs.
引用
收藏
页码:135 / 143
页数:9
相关论文
共 50 条
  • [21] A multicast protocol for mobile adhoc networks
    Anupama, KR
    Balasubramanian, S
    2002 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2002, : 187 - 191
  • [22] AN INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORKS
    Madhavi, S.
    Kim, Tai Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 1 - 16
  • [23] MCDS based multicasting in mobile adhoc networks
    Shukla, M.
    Rai, M.
    Tomar, G. S.
    Verma, S.
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 52 - 57
  • [24] Multipath Routing Protocol for Mobile Adhoc Networks
    Matre, Versha
    Karandikar, Reena
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [25] Taming epidemic outbreaks in mobile adhoc networks
    Hoque, E.
    Potharaju, R.
    Nita-Rotaru, C.
    Sarkar, S.
    Venkatesh, S. S.
    AD HOC NETWORKS, 2015, 24 : 57 - 72
  • [26] An intrusion detection system in mobile adhoc networks
    Madhavi, S.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 7 - 14
  • [27] Enhanced Route Discovery in Mobile Adhoc Networks
    Ali, Sikkandar Ali Vashik
    Jeyaseelan, W. R. Salem
    Hariharan, Shanmugasundaram
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [28] Survey on Bias Minimization and Application Performance Maximization using Trust Management in Mobile Adhoc Networks
    Nanaware, Pradnya M.
    Babar, Sachin D.
    Sinha, Ajay
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 831 - 834
  • [29] A survey on assorted subsisting approaches to recognize and preclude black hole attacks in mobile Adhoc networks
    Thebiga M.
    Suji Pramila R.
    International Journal of Interactive Mobile Technologies, 2020, 14 (01) : 96 - 108
  • [30] Throughput analysis in mobile adhoc network: a literature survey
    Divakara, Madhurya Kodialbail
    Rajak, A. R. Abdul
    2018 3RD INTERNATIONAL CONFERENCE ON MECHANICAL, MANUFACTURING, MODELING AND MECHATRONICS (IC4M 2018) - 2018 3RD INTERNATIONAL CONFERENCE ON DESIGN, ENGINEERING AND SCIENCE (ICDES 2018), 2018, 167