A Study of Attack on Wireless Ad-Hoc Network

Authors

  • Pawitar Dulari  Department of Physics, Government P.G. College Una (H.P.), India

DOI:

https://doi.org//10.32628/IJSRSET196646

Keywords:

MANET, Classification of Attacks, Security in MANET, Ad Hoc.

Abstract

Security is an essential requirement in wireless ad hoc network. The type of ad hoc networks makes them vulnerable to distinct forms of attack. The random nature of these networks makes invoke of security a challenging issue. The paper shows the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks. Then it presents the main attack categories that exist in it. Finally presents the current security solutions for the mobile ad hoc network.

References

  1. M. Parsons and P.Ebinger, "Performance Evaluation of the Impact of Attacks on mobile Ad-Hocnetworks. https://pdfs.semanticscholar.org/6a87/fbd85d704e2de14e8738f6d5ff075a8fca9f.pdf
  2. P.V.Jani, "Security within Ad-Hoc Networks," Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  3. G. A. Pegueno and J. R. Rivera, "Extension to MAC 802.11 for performance Improvement in MANET", Karlstads University, Sweden, December 2006
  4. S. Lu, L. Li, K.Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.," International Conference on Computational Intelligence and Security, 2009.
  5. K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology" Sweden, 22nd March 2007
  6. D.B.Roy, R.Chaki and N.Chaki, "A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Neworks", International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1, April, 2009.
  7. N.Shanti, Lganesan and K.Ramar, "Study of Different Attacks On Multicast Mobile Ad-HocNetwork". 8C.Wei, L.Xiang, B.yuebin and G.Xiaopeng, "A New Solution for Resisting Gray Hole Attack in Mobile AdHoc Networks", Second International Conference on Communications and Networking in china, pp.366-370, Aug, 2007.
  8. Y. Hu, A. Perrig and D. Johnson, Packet Leashes: A Defense against Wormhole Attacksin Wireless Ad Hoc Networks, in Proceedings of IEEE INFOCOM’03, 2003.
  9. Y. Hu, A. Perrig and D. Johnson, Wormhole Attacks in Wireless Networks, IEEEJournal on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
  10. Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad HocNetwork Routing Protocols, in Proceedings of ACM MobiCom Workshop - WiSe’03,2003.
  11. Sergio Marti, T. J. Giuli, Kevin Lai and Mary Baker, Mitigating routing misbehavior inmobile ad hoc networks, in Proceedings of the 6th annual international conference on Mobilecomputing and networking (MobiCom’00),pages 255–265, Boston, MA, 2000.
  12. Jim Parker, Discussion Record for the 1st MANET Reading Group Meeting,http://logos.cs.umbc.edu/wiki/eb/index.php/February_10%2C_2006 (Authorizationrequired).
  13. Wenjia Li and Anupam Joshi, "Security Issues in Mobile Ad Hoc Networks - A Survey".
  14. Sukla Banerjee, "Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks", Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
  15. A Study of wireless Ad-Hoc Network attack and Routing Protocol attack M Kumar, A Bhushan, A Kumar International Journal of Advanced Research in Computer Science 2, 4
  16. FahadSamad, Qassen Abu Ahmed, AsadullahShaikh and Abdul Aziz, "JAM: Mitigating Jellyfish Attack in Wireless Ad hoc Networks",B.S. Chowdhary et.al.(Eds.):IMTIC 2012,CCIS 281,PP, 432-144.2012.
  17. M.T.Refaei, V.Srivastava, L.Dasilva, M.Eltoweissy, "A Reputation-Based Mechanism for Isolating Selfish nodes in Ad-Hoc Networks," Second Annual International Conference on Mobile and Ubiquitous Systems, Networking and Services, pp.3-11, July, 2005.
  18. H.L.Nguyen,U.T.Nguyen, "Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks," International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006.
  19. S.Marti, T.J.Giuli, K.Lai, M.Baker, "Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks".
  20. Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad-Hoc Networks. Proc. of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), pp. 3-13,2002.
  21. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Pawitar Dulari, " A Study of Attack on Wireless Ad-Hoc Network, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 6, pp.168-174, November-December-2019. Available at doi : https://doi.org/10.32628/IJSRSET196646