Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks

Authors

  • KONATE K Department of Mathematics and Computing University Cheikh Anta DIOP Dakar, Senegal
  • Abdourahime G Department of Mathematics and Computing University Cheikh Anta DIOP Dakar, Senegal

Keywords:

Mobile Ad Hoc, routing, security, attacks, countermeasure

Abstract

The present work is dedicated to study attacks and countermeasures in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a table which summarizes the advantages and the disadvantages of the mechanisms proposed were presented.

References

Wiley John: SEURITY for WIRELESS AD HOC NETWORKS. Eyrolles, book 2007, pages 247.

ADJIDO Idjiwa, BENAMARA Radhouane, BENZIMRA Rebecca, GIRAUD Laurent: secure Protocol routing of ad hoc in a clusterized architecture. University Pierre and Marie (Paris VI) Paris, FRANCE, November 2005, pages 4.

Curtmola Reza. Security of Routing Protocols in Ad Hoc Wireless Networks. 600.647 Advanced Topics in Wireless Networks, February 2007, pages 26.

Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Department of Computer Science and Engineering Florida Atlantic University, December 2005

Chen Ruiliang, Snow Michael, Park Jung-Min, M. Refaei Tamer, Eltoweissy Mohamed. Defense against Routing Disruption Denial-of-Service Attacks in Mobile Ad Hoc Networks. Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State

University Blacksburg, VA, USA, November 2005, pages 15.

A.Rajaram, Dr. S. Palaniswami. The Trust-Based MACLayer Security Protocol for Mobile Ad hoc Networks.. (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 400-408. Anna University Coimbatore, India, March 2010, pages 9.

Payal N. Raj, Prashant B. Swadas. DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET,

IJCSI International Journal of Computer Science Issues, Vol. 2, Computer Engineering Department, SVMIT Bharuch, Gujarat, India, September 2009, pages 6.

Xue Xiaoyun. Security mechanisms for ad hoc routing protocols. Computer Science and Network Department, ENST, thesis September 2006, pages 234.

Ramaswamy Sanjay, Fu Huirong, Sreekantaradhya Manohar, Dixon John and Nygard Kendall: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. Department of Computer Science, IACC 258 North Dakota State University, Fargo, ND 58105, March 2003, pages 7.

Hesiri Weerasinghe and Huirong Fu. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation ; International Journal of Software Engineering and Its Application Vol. 2, No. 3. Oakland University Rochester MI 48309 USA, June 2008; page 16.

Hu Yih-Chun, Perrig Adrian, Johnson David B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, INFOCOM 2003, pages 11

Emmanouil A. Panaousis, Levon Nazaryan, Christos Politis. Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications, Wireless Multimedia and Networking (WMN) Research Group Kingston University London. Jully 2009, pages 7.

Shang-Ming Jen 1, Chi-Sung Laih 1 and Wen-Chung Kuo. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.

Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki. A NEW CLUSTER BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD HOC NETWORKS. International Journal of Network Security and Its Applications (IJNSA), Vol 1, No 1, West Bengal

University of Technology, Kolkata 700064, India. April 2009, pages 9.

Hu Lingxuan et Evans David: Using Directional Antennas to Prevent Wormhole Attacks. University of Virginia, California, USA. February 2004, pages 11.

T.V.P.Sundararajan and Dr.A.Shanmugam. Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET. Sathyamangalm 638401, Tamilnadu,, India, May 2009, pages 14.

Kevin Ho man, David Zage, and Cristina Nita-Rotaru. A Survey of Attack and Defense Techniques for Reputation Systems. Department of Computer Science and CERIAS, Purdue University. April 2008, pages 19.

Pietro Michiardi: Cooperation in the ad hoc networks: Application of the evolution and game theory and the evolution of imperfect observability. Institute Eurecom 2229, road of the Peaks LP 19306904 Sophia-Antipolis, France, July 2006, pages 17

Michiardi Pietro and Molva Refik: CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. European Wireless Conference, Nonvember 2003, pages 15.

Hu Jiangyi: Cooperation in Mobile Ad Hoc Networks. Computer Science Department Florida State University, January 11, 2005, pages 23.

Buttyan Levente and Hubaux Jean-Pierre: Nuglets: a virtual Currency to Stimule Cooperation in Self-Organized Mobile Ad Hoc Networks. Institute for Computer Communications and Applications Department of Communication Systems Swiss Federal Institute of Technology Lausanne, 18 January 2001, pages 15.

GETSY S SARA, NEELAVATHY PARI.S, SRIDHARAN.D. Energy Efficient Ad Hoc On Demand Multipath Distance Vector Routing Protocol, International Journal of Recent Trends in Engineering, Vol 2, No. 3. Department of Electronics and Communication Engineering, CEG Campus, Anna University Chennai, India November 2009, pages 3.

Mads Dar Kristensen and Niels Olof Bouvin. Energy E cient MANET Routing Using a Combination of Span and BECA/AFECA. JOURNAL OF NETWORKS, VOL. 3, NO. 3, New York, USA, MARCH 2008, pages 8.

S ARVIND, DR.T.ADILAKSHMI. POWER AWARE ROUTING FOR MOBILE AGENT IN AD-HOC NETWORKS. Journal of Theoretical and Applied Information Technology. Department of Computer Science Engineering, Vasavi College of Engineering, Hyderabad- 500031. Mai 2009, pages 7.

Idoudi Hanen, Akkari Wafa, Belghith Abdelfatteh, Molnar Miklos: Synchronous alternation for the conservation of energy in the ad hoc mobile networks. MADE IRIDESCENT, University Center of Beaulieu-35042 Rennes Cedex-France, November 2006, pages 46.

Choi Heesook, McDaniel Patrick, La Porta Thomas F.: Privacy Preserving Communication in MANETs. Department of Computer Science and Engineering the Pennsylvania State University, March 2007, pages 10.

Yan Zheng, Zhang Peng, Virtanen Teemupekka. Trust Evaluation Based Security Solution in Ad Hoc Networks. Helsinki University of Technology, Finland, December 2003, pages 14.

Yi Ping, Dai Zhoulin, Zhang Shiyong, Zhong Yiping: A New Routing Attack in Mobile Ad Hoc Network. Department of Computing and Information Technology, Fudan University, Shanghai, 200433, China, June 2005, pages 12.

Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao. Performance Analysis of Flooding Attack Prevention Algorithm in MANETs. World Academy of Science, Engineering and Technology 56, September 2009, pages 4.

Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Impact of Denial of Service,Attacks on Ad Hoc Networks. DoCoMo Euro-Labs EPFL Rice University Munich, Germany Lausanne, Switzerland Houston, TX, July 2007, pages 14.

Aad Imad, Hubaux Jean-Pierre, Knightly Edward W. Denial of Service Resilience in Ad Hoc Networks; MobiCom’04, Sept. 26Oct. 1, 2004, Philadelphia, Pennsylvania, USA, pages 14.

Downloads

Published

2024-02-26

How to Cite

KONATE, K., & Abdourahime, G. (2024). Attacks analysis and countermeasures in routing protocols of mobile ad hoc networks. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1425–1430. Retrieved from https://ijact.in/index.php/j/article/view/247

Issue

Section

Original Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.