Survey on Secure Routing in Mobile Ad-hoc Networks

被引:0
|
作者
Kannammal, A. [1 ]
Roy, S. Sujith [2 ]
机构
[1] Coimbatore Inst Technol, Dept Comp Applicat, Coimbatore 641014, Tamil Nadu, India
[2] Kumaraguru Coll Technol, Dept Informat Technol, Coimbatore 641049, Tamil Nadu, India
关键词
Communication Network Security; MANET Security; Secure Routing; Security Survey;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless networks are widely deployed in the present scenario. A type of wireless network, mobile ad hoc network (MANET) is an autonomous system of mobile nodes where a collection of mobile hosts with wireless network interfaces form a temporary network without the aid of any fixed infrastructure or centralized administration. The success of MANET strongly depends on its security. Security is an essential service for wireless network communications especially in mission-critical applications like military applications. A variety of attacks such as Warmhole, Blackhole, Byzantine, Rushing/Flooding, Anonymity/Location Disclosure, Denial of Service etc have been identified and some solutions have been proposed in the literature. However, existing published solutions typically concentrate on particular type of attacks and are incapable of identifying threats, which occur as a result of combination of these attacks. As overall security level is determined by the system's weakest point, a distributed security scheme that uses an integrated approach to address a combination of these attacks is very much necessary. The work in progress aims to investigate the possible combination of attacks that can be addressed by integrating some of the existing work on mobile ad hoc networks security, which addresses a portion of the security concerns individually. The analysis of attacks and existing mechanisms that would help to design an integrated approach for security services is presented in this paper.
引用
收藏
页码:154 / 160
页数:7
相关论文
共 50 条
  • [1] Anonymous secure routing in mobile ad-hoc networks
    Zhu, B
    Wan, ZG
    Kankanhalli, MS
    Bao, F
    Deng, RH
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 102 - 108
  • [2] A secure routing protocol for mobile ad-hoc networks
    Jiang, TY
    Li, QH
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2825 - 2829
  • [3] A Multipath Routing Survey for Mobile Ad-Hoc Networks
    Adibi, Sasan
    Erfani, Shervin
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 984 - +
  • [4] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    [J]. ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [5] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [6] Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
    Ali, Masroor
    Ullah, Zahid
    Khan, Meharban
    Hafeez, Abdul
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 436 - 441
  • [7] Secure and scalable routing protocol for Mobile Ad-hoc Networks
    Kang, NH
    Park, I
    Kim, Y
    [J]. MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2005, 3744 : 334 - 343
  • [8] Secure multicast routing protocols in mobile ad-hoc networks
    Moamen, Ahmed Abdel
    Hamza, Haitham S.
    Saroit, Iman A.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2808 - 2831
  • [9] Power Aware and Secure Routing in Mobile and Ad-Hoc Networks
    Arya, K. V.
    Tripathi, Kuldeep Narayan
    [J]. 2013 8TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2013, : 477 - 482
  • [10] A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks
    Luo Junhai
    Ye Danxia
    Xue Liu
    Fan Mingyu
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 78 - 91