Security in Mobile ADHOC Networks: Survey

被引:5
|
作者
Kariyannavar, Sharat S. [1 ]
Thakur, Shreyas [1 ]
Maheshwari, Aastha [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Engn, Delhi, India
关键词
Mobile ADHOC Networks; Routing protocols; Attacks in MANET; Blackhole; Gray Hole; Jellyfish; Worm Hole; Rushing; Sybil attacks; mitigation techniques; WORMHOLE ATTACKS;
D O I
10.1109/ICICT50816.2021.9358611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Adhoc Networks (MANETs) are dynamic, flexible, and mobile. While they enjoy several advantages over traditional wireless networks due to these characteristics, their lack of infrastructure leaves them susceptible to a plethora of security threats. To better understand these threats, the traits of MANETs are elucidated and their vulnerable features are brought to light. Subsequently, the paper classifies and differentiates security attacks into various categories on several bases. Here, Data Traffic attacks, which directly affect the information being transmitted over the network, and Control Traffic attacks, which affect the flow of traffic in a network, are the primary focus. Examples of each of these attacks are explained with their functioning. Research work regarding the same have been studied and most effective countermeasures are mentioned. This paper aims to concisely summarize existing excellent research to defog uncertainties regarding the practical implementation of MANETs.
引用
收藏
页码:135 / 143
页数:9
相关论文
共 50 条
  • [31] A Novel Authentication and Security Protocol for Wireless Adhoc Networks
    Amin, Umair
    Shah, Munam Ali
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 567 - 571
  • [32] A Novel Approach to Implement Fixed to Mobile Convergence in Mobile Adhoc Networks
    Suri, P. K.
    Maan, Sandeep
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (01) : 93 - 99
  • [33] A Review on Security Related Aspects in Vehicular Adhoc Networks
    Kaur, Navjot
    Kad, Sandeep
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 387 - 394
  • [34] Secure Intrusion Detection System for Mobile Adhoc Networks
    Bharati, Taran Singh
    Kumar, R.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1257 - 1261
  • [35] An Improved Cluster Maintenance Scheme for Mobile AdHoc Networks
    Pathak, Sunil
    Dutta, Nitul
    Jain, Sonal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2117 - 2121
  • [36] A Comparative Study on Intrusion Detection in Mobile Adhoc Networks
    Divya, S.
    Krishnaveni, S. H.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [37] An improved intrusion detection technique for mobile adhoc networks
    Prasanna, S
    Vetriselvi, V
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 364 - 376
  • [38] TCP Variants for Mobile Adhoc Networks: Challenges and Solutions
    Hardik K. Molia
    Amit D. Kothari
    Wireless Personal Communications, 2018, 100 : 1791 - 1836
  • [39] Analysing the Data Variation of QOS in Mobile adhoc networks
    Malany, A. Boomarani
    Chandrasekaran, R. M.
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 881 - 883
  • [40] A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks
    Al-Nasser, Ahmed
    Almesaeed, Reham
    Al-Junaid, Hessa
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (03) : 483 - 496