Security in Mobile ADHOC Networks: Survey

被引:5
|
作者
Kariyannavar, Sharat S. [1 ]
Thakur, Shreyas [1 ]
Maheshwari, Aastha [1 ]
机构
[1] Delhi Technol Univ, Dept Comp Engn, Delhi, India
关键词
Mobile ADHOC Networks; Routing protocols; Attacks in MANET; Blackhole; Gray Hole; Jellyfish; Worm Hole; Rushing; Sybil attacks; mitigation techniques; WORMHOLE ATTACKS;
D O I
10.1109/ICICT50816.2021.9358611
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Adhoc Networks (MANETs) are dynamic, flexible, and mobile. While they enjoy several advantages over traditional wireless networks due to these characteristics, their lack of infrastructure leaves them susceptible to a plethora of security threats. To better understand these threats, the traits of MANETs are elucidated and their vulnerable features are brought to light. Subsequently, the paper classifies and differentiates security attacks into various categories on several bases. Here, Data Traffic attacks, which directly affect the information being transmitted over the network, and Control Traffic attacks, which affect the flow of traffic in a network, are the primary focus. Examples of each of these attacks are explained with their functioning. Research work regarding the same have been studied and most effective countermeasures are mentioned. This paper aims to concisely summarize existing excellent research to defog uncertainties regarding the practical implementation of MANETs.
引用
收藏
页码:135 / 143
页数:9
相关论文
共 50 条
  • [41] A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS
    Djenouri, Djamel
    Khelladi, Lyes
    Badache, Nadjib
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04): : 2 - 28
  • [42] Enhanced AODV Routing Protocol for Mobile Adhoc Networks
    Shobha, K. R.
    Rajanikanth, K.
    ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 265 - 276
  • [43] A New Protocol to Secure AODV in Mobile AdHoc Networks
    Krishnan, Avinash
    Manjunath, Aishwarya
    Reddy, Geetha J.
    ADVANCED COMPUTING, PT III, 2011, 133 : 378 - 389
  • [44] Interference Management through Mobile Relays in Adhoc Networks
    Naini, Rohit
    Moulin, Pierre
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 2077 - 2080
  • [45] Mapping wireless signal strength for mobile adhoc networks
    Larkin, H
    da Wu, Z
    Toomey, W
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 151 - 157
  • [46] Self-organized management of mobile adhoc networks
    Kulkarni, Amit B.
    Spackmann, Richard
    Kuthethoor, Giri
    MILCOM 2006, VOLS 1-7, 2006, : 1165 - +
  • [47] A Comprehensive Analysis of DoS Attacks in Mobile Adhoc Networks
    Das, Kasturiniva
    Taggu, Amar
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2273 - 2278
  • [48] Stable and energy efficient routing for mobile Adhoc networks
    Rishiwal, Vinay
    Kush, Ashwani
    Verma, Shekhar
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 1028 - +
  • [49] Design and Performance of QOSRGA Protocol for Mobile Adhoc Networks
    Abdullah, J.
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2009, 1 (03): : 19 - 31
  • [50] A Robust Cooperation Approach For Mobile Multimedia Adhoc Networks
    Bahi, J. M.
    Eskandar, M.
    Mostefaoui, A.
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 499 - 504