Open Access Open Access  Restricted Access Subscription or Fee Access

Review on Network Layer Attacks and Counter Measures in MANET

K.M. Mehata, V. Muthupriya

Abstract


A security is one of the major issues in the MANET. The major security goals for any network are confidentiality between the sender and receiver, authenticity in transmitting the packets through intermediate hops, integrity in packet transmitted i.e. the original data remain unaltered, network availability during link failure and non-repudiation, where sender or receiver cannot deny on the message sent or received. These security goals are not easily attained in MANET due to its characteristics like unguided communication media, dynamic nature, no fixed infrastructure and centralized network management. Many proactive and reactive protocols have been proposed for routing in MANET but still they are vulnerable to several attacks. In this paper we will discuss in detail about such attacks and the research works carried out to overcome them.

Keywords: MANET, network management, proactive and reactive protocols

Full Text:

PDF

References


Canavan, John E. Fundamentals of network security. Library of Congress Cataloging-in-Publication Data, Artech House Telecommunications Library. 2000; QA76.9.A25 C364.

Al-Omari S.A.K., Sumari P. An overview of mMobile Ad Hoc networks for the existing protocols and applications. Int J on Appl of graph theory in wireless ad hoc networks and sensor networks. (Graph-Hoc). 2010 March; 2(1).

Broch J., Maltz D. A., Johnson D. B. et al. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In ACM MOBICOM. 1998; 85–97p.

Awerbuch B., Curtmola R., Holmer D. et al. ODSBR: An On-demand secure byzantine resilient routing protocol for wireless AdHoc networks. ACM Trans Inf Sys Sec. 2008 Jan; 10(4).

Hu L., Evans D. Using directional antennas to prevent wormhole attacks. 11th Network and Distributed System Security Symposium. 2003; 131¬41p.

Capkun S., Buttyan, Hubaux J.P. SECTOR: Secure tracking of node encounters in multihop wireless networks. Procc of the 1st ACM workshop on security of ad hoc and sensor networks. 2003 oct; 21¬32p.

Khalil S., Bagchi N., Shroff B. A lightweight countermeasure for the wormhole attack in multihop wireless networks. International Conference on Dependable Systems and Networks. 2005.

Qian L., Song N., Li X. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. IEEE Wireless Communication and Networking Conference 2005 March; 4: 2106¬11p.

Hu Y., Perrig A., Johnson D. Worm hole attacks in Wireless Networks. IEEE Journal on Selected areas in Communications. 2006 Feb; 24(2): 370¬80p.

Su X., Boppana R.V. On mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks. IEEE International Conference on Communications. ICC’07. 2007 June; 1136¬41p.

Xu Z., Jin Y., Shu W. et al. A secure reputation-based dynamic window scheme for disruption-tolerant networks. In: Military Communications Conference (MILCOM 2009), Boston; 2009: 1–7p.

Dini G., Duca A.L. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Elsevier, Ad Hoc Networks 10. 2012; 1167–78p.

Li N., Das S.K. A trust-based framework for data forwarding in opportunistic networks, Ad Hoc Networks. In press (Corrected Proof).

Yu Y., Lei G., Xingwei W. et al. Routing security scheme based on reputation evaluation in hierarchical adhoc networks. Comput Netw 2010; 54: 1460¬9p.

Li F., Wu J., Avinash S. Thwarting black hole attacks in disruption tolerant networks using encounter tickets. In: International Conference on Computer Communications (INFOCOM 2009), Riode Janeiro; 2009: 2428–36p.

Ren Y., Chuah M.C., Yang J. et al. Detecting black-hole attacks in disruption-tolerant networks through packet exchange recording. In: World of Wireless Mobile and Multimedia Networks (WoWMoM2010), Montreal, QC, Canada; 2010: 1–6p.

Ren Y., Chuah M.C., Yang J. et al. Detecting malicious nodes in disruption-tolerant networks. In: Wireless Communications and Networking Conference (WCNC 2010), Sidney, NSW; 2010: 1–6p.

Gupta G., Nagrath P., Aneja S. et al. A reference based approach to Mitigate Black-hole Attacks in Delay Tolerant Networks. ACM, Q2SWinet’12. 2012 October.

Burgess J., Bissias G.D., Corner M.D. et al. Surviving attacks on disruption-tolerant networks without authentication. In: Proceedings of the 8th ACM international symposium on Mobile networks.

Marti S. et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. 6th Int’l. Conf. Mobile Comp. Net. Aug. 2000; 255–65p.

Zhang Y., Lee W. Intrusion Detection in Wireless Ad-Hoc networks. Proc. 6th Int’l. Conf. Mobile Comp.Net., MobiCom. 2000 Aug.; 275–83p.

Albers P. et al. Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches,” 1st Int’l. Wksp. WL Info. Sys., 4th Int’l. Conf. Enterprise Info. Sys., 2002.

Lee S., Han B., Shin M. Robust Routing in Wireless Ad Hoc Networks. Int’l. Conf. Parallel Processing Wksps. Vancouver, Canada; 2002 Aug.

M. A.S., Yoo S-M., Park S. Black Hole Attack in Mobile Ad Hoc Networks. ACM Southeast Regional Conf. 2004.

Kurosawa S. et al. Detecting black-hole attack on AODV-based mobile ad hoc networks by dynamic learning method. Proc. Int’l. J. Network Sec. 2006.

Chuah M., Yang P. Impact of selective dropping attacks on network coding performance in DTNS and a potential mitigation scheme. In:Computer Communications and Networks (ICCCN 2009), San-Francisco, CA; 2009: 1–6p.

Xiaopeng G., Wei C. A novel gray hole attack detection scheme for mobile ad-hoc networks. IFIP, International Conference on Network and Parallel Computing – Workshops. 2007; 209-14p.

Jiang F.C., Lin C.H., Wu H.W. Lifetime elongation of ad-hoc networks under flooding attack using power-saving technique. Adhoc Networks. 2014; 21: 84¬90p.

Choudhury P., Nandi S., Pal A. et al. Mitigation Route Request Flooding Attack in MANET using Node Reputation. IEEE Computer Networks. 2012; 71¬8p.

Sui A.F., Guo D.F., Zhao D.S.H. An effective method to mitigate route query floods in MANETs. IEEE Dept of Electronics and Communication. 2011.

Liu S.L.Q., Chen H., Tan M. A New method to resist flooding attacks in adhoc networks. IEEE Computer Science Engineering. 2006; 474¬80p.

Balakrishnan V., Varadharajan V., Tupakula U.K. Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. IEEE. 2006.

Desilva S., Boppana R. V. Mitigating malicious control packet floods in ad hoc networks. IEEE Communication Society. 2005; 15: 774¬82p.

Perrig A., Stoica I., Adkins D. Taming IP Packet Flooding Attacks. ACM SIGCOMM Computer Communications. 2004; 526¬33.

Tseng Y.C., Ni S.Y., Chen Y.S. et al. The broadcast storm problem in a mobile ad hoc network. Wireless Networks. 2004; 8: 153¬67p.

Hu Y.C., Perrig A., JohnsonD.B. Rushing attacks and defense in wireless ad hoc network routing protocols. WiSe 2003. San Diego.

Latha T., Sankaranarayanan V. 2006. Solution to Prevent Rushing Attack in Wireless Ad hoc Networks. IEEE. 42–7p.

Reddy K.G., Thilagam P.S., Rao B.N. Cross-Layer IDS for rushing attack in wireless mesh networks. CCSEIT-12, 2012 October 26-28, Coimbatore, Tamil nadu, ACM, 2012.

Shrivastava S. Rushing Attack and its Prevention Techniques. Int J Appl Innov Engg Mange. 2003 April; 2(4).

Chandel G.S., Chowksi R. Effect of Rushing Attack in AODV and its Prevention Technique. Int J of Comp Appl. 2013; 83: 10-15p.

Raffo D. et al. Securing OLSR Using Node Locations. Proc. 2005 Euro. Wireless, Nicosia, Cyprus. 2005 Apr. 10–13.

Kannhavong B. et al. A collusion attack against OLSR-based mobile ad hoc networks. IEEE GLOBECOM’06.

Zhan G., Shi W., Deng J. TARF: A trust-aware routing framework for wireless sensor networks. IEEE Transaction on Dependable and Secure Computing. 9(2); 184¬97p.

Shino Sara Varghese, J. Immanuel John Raja,” A Survey on Anonymous Routing Protocols in MANET” RECENT ADVANCES in NETWORKING, VLSI and SIGNAL PROCESSIN ISSN: 1790-5117 88 ISBN: 978-960-474-162-5

Anonymous Connections and Onion Routing”. IEEE Journal on Selected Areas in Communications, Vol.16, pp.482-494, 1998.

J. Kong, X. Hong, and M. Gerla, “ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. ACM MobiHoc, pp. 291-302, 2003.

R. Song, L. Korba, and G. Yee, “AnonDSR:Efficient Anonymous Dynamic Source Routingfor Mobile Ad-Hoc Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’05), 2005.

Y Zhang, W Liu, W Lou, Y Fang. ”MASK:Anonymous On-Demand Routing in Mobile Ad HocNetworks“ IEEE Transactions on Wireless Communications, Vol. 5, pp. 2376-2385, 2006.

Boukerche, K. El-Khatib, L. Xu, and L. Korba. A novel solution for achieving anonymity in wireless ad hoc networks.in Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. ACM Press. 2004; 30–8p.

Zhu, Z. Wan, M. Kankanhalli, F. Bao, and R. Deng,”Anonymous secure routing in mobile ad-hoc networks” in Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN 2004), pages 102–108. IEEE, 2004.

Ehsan Bagherian, Siavash Khorsandi, ARMAN: A new Anonymous Routing Protocol for Mobile Ad-Hoc Networks,978-1-4244-4439-7/09/$25.00 ©2009 IEEE.

Zhao L., Shen H. ALERT: An anonymous location-based efficient routing protocol in MANETs. IEEE Trans Mob Comp. 2013June; 12(6).

Zhang Y., Yan T., Tian J. et al. TOHIP:A topology-hiding multipath routing protocol in mobile ad hoc networks. IEEE Ad Hoc Networks. 2014; 21: 109–22p.

Dahill B., Levine B. N., Royer E. et al. ARAN: A secure Routing Protocol for Ad Hoc Networks. UMass Tech Report 02-32. 2002.

Papadimitratos P., Haas Z. J., Samar P. The Secure Routing Protocol (SRP) for Ad Hoc Networks. draft papadimitratos- secure-routing- protocol- 00.txt, Dec. 2002.

Yi S., Prasad, Kravets R. Security aware routing protocol. IEEE Network Security Conference. 2001.

Hu Y.-C., Johnson D.B., Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications. Callicoon, NY; 2002 June: 3¬13p.

Zapata M.G. Secure ad-hoc on-demand distance vector (SAODV) routing. IETF MANET, internet draft (Work in progress),draft -guerrero-manet-saodv-00.txt,2001.-accessed 10/10/2006.

Hu Y.-C., Perrig A., Johnson D.B. Ariadne: A secure on-demand routing protocol for ad hoc networks. Proc.8th ACM Int’l. Conf. Mobile Computing & Networking (Mobicom’02), Atlanta, Georgia; 2002 September: 12-23p.

Kishore P.R., SrinivasaRao O., Krishna Prasad M.H.M. Multiple trust in trust-based on-demand routing in mobile ad hoc networks. Int J Adv Comp Engg Comm Tech. 2012; 1(2).

Muthupriya V., Mehata K.M. Performance of AOMDV under the impact of rushing attack. Int J Appl Engg Res. June 2015; 10(11): 29581-94p




DOI: https://doi.org/10.37628/ijaic.v2i1.212

Refbacks

  • There are currently no refbacks.