Security issues in mobile adhoc network: A survey paper

Author(s):  
Akansha Vij ◽  
Vishnu Sharma
Author(s):  
Gurpreet Singh, Ganpat Joshi

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.


Author(s):  
Pradeep Kumar Krishnappa ◽  
B R Prasad Babu

<span>The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues. This paper primarily discusses on the security issues, which has been still unsolved after abundant research work. The paper basically stresses on the potential features of Swarm Intelligence (SI) and its associated techniques to mitigate the security issues. Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively. Elaborated discussion on SI with respect to trust management, authentication, and attack models are made with support of some of the recent studies done in same area. The paper finally concludes by discussing the open issues and problem identification of the review.</span>


Author(s):  
Mamata Rath ◽  
George S. Oreku

For successful data transmission in wireless networks, security features are very much essential to implement. A mobile adhoc network contains a set of autonomous mobile stations that can correspond with each other instead of some adverse situation of wireless environment. Those mobile nodes that are not in the same series can communicate with others through intermediate hops. Security is a challenging mission in mobile adhoc network (MANET) due to many serious issues in the network such as hop-to-hop persistent wireless connectivity, high frequency of variation in topology of the network, and increasing rate of link failure due to higher mobility. So, it is very challenging to develop a secured, dynamic, and efficient routing protocol for such a magnificent network. In this chapter, vulnerability issues of MANET are focused on with a spotlight on prominent MANET protocols. A brief study on technical issues responsible for vulnerability in MANET has been depicted with systematic review on various issues and protocols that provide secured routing in the network.


Author(s):  
Mamata Rath ◽  
George S. Oreku

For successful data transmission in wireless networks, security features are very much essential to implement. A mobile adhoc network contains a set of autonomous mobile stations that can correspond with each other instead of some adverse situation of wireless environment. Those mobile nodes that are not in the same series can communicate with others through intermediate hops. Security is a challenging mission in mobile adhoc network (MANET) due to many serious issues in the network such as hop-to-hop persistent wireless connectivity, high frequency of variation in topology of the network, and increasing rate of link failure due to higher mobility. So, it is very challenging to develop a secured, dynamic, and efficient routing protocol for such a magnificent network. In this chapter, vulnerability issues of MANET are focused on with a spotlight on prominent MANET protocols. A brief study on technical issues responsible for vulnerability in MANET has been depicted with systematic review on various issues and protocols that provide secured routing in the network.


Author(s):  
Srividya R. ◽  
Ramesh B.

Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.


Sign in / Sign up

Export Citation Format

Share Document