Safety in Mobile Network Connections

Authors

  • Dr. Firoz Kayum Kajrekar  Department CS & IT, SPK, Sawantwadi, Maharashtra, India
  • Dr. C. D. Sonawane  Department CS & IT, YCC College, Sillod, Maharashtra, India

Keywords:

MANET, Ad hoc Network, Mobile Network, Mobile Security

Abstract

The Ad Hoc network of mobile and wireless nodes, with its special characteristics of easy and quick setup, dynamic topology and hop-by-hop communications faces lots of challenges allegorically routing, security and clustering. Due to its self-configuration and self-maintenance capabilities, a security challenge arises. This paper, elaborate view of security issues in Mobile Ad Hoc Network – MANET. Based on MANET special characteristics, we define three security parameters for MANET. In addition, we divided MANET security into two different aspects and discussed each one in details. A comprehensive analysis in security aspects of MANET and protecting approaches is presented. In addition to protecting against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.

References

  1. A.Gantes and J. Stucky, "A platform on a Mobile Ad hoc Network challenging collaborative gaming," international symposium on collaborative technologies and systems, 2008.
  2. K.U. R. Khan, R. U. Zaman, and A. V. G. Reddy, "Integrating Mobile Ad Hoc Networks and the Internet challenges and a review of strategies," presented at the 3rd International Conference on Communication Systems Software and iddleware and Workshops, COMSWARE, 2008.
  3. M.Suguna and P. Subathra, " Establishment of stable certificate chains for authentication in mobile ad hoc networks," presented at the International Conference on Recent Trends in Information Technology (ICRTIT), 2011.
  4. H.Nishiyama, T. Ngo, N. Ansari, and N. Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," Wireless Communications, IEEE Transactions, 2012.
  5. F.D. Rango, M. Fotino, and S. Marano, "EE-OLSR: Energy Efficient OLSR routing protocol for Mobile ad-hoc Networks," presented at the Military Communications Conference, MILCOM, 2008.
  6. K.Du and Y. Yang, "Policy-Based Time Slot Assignment algorithm in a MANET(PBTSA)," presented at the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID, 2009.
  7. R.Sheikh, M. S. Chande, and D. K. Mishra, "Security issues in MANET:A review," presented at the Seventh International Conference On Wireless And Optical Communications Networks (WOCN), 2010.
  8. H.Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks,," Communications Magazine,IEEE, 2002.
  9. Y.Z.a and W. Lee, "Intrusion Detection in Wireless Ad-Hoc networks," presented at the 6th Int’l. Conf. Mobile Comp. Net., MobiCom, 2000.
  10. F.S.A and R. Anderson, "The Resurrecting Ducking: Security Issues for Ad-Hoc Wireless Networks," 7th Int’l. Wksp on Security Protocols. Proc., LNC, 1999.
  11. X.Zhao, Z. You, Z. Zhao, D. Chen, and F. Peng, "Availability Based Trust Model of Clusters for
  12. MANET," presented at the 7th International Conference on Service Systems and Service Management (ICSSSM), 2011.
  13. E.C.H.Ngai and L. M. R, "Trust and clustering-based Authentication Services in Mobile ad hoc networks," presented at the proceeding of the 24th international conference on Distributed Computing systems Workshops 2004.
  14. W.Lou, W. Liu, and Y. Fang, "SPREAD: enhancing data confidentiality in mobile ad hoc networks," presented at the Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, 2004.
  15. S.Rana and A. Kapil, "Security-Aware Efficient route Discovery for DSR in MANET," Information and Communication Technologies, ommunications in Computer and Information Science, vol. 101, pp. 186-194, 2010.
  16. X.Lv and H. Li, "Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks," Information Security, IET, vol. 7, 2013.
  17. S.a.A.k.G, H.o.d.R.m, and S. sharma, "A Comprehensive Review of Security Issues in Manets," International Journal of Computer Applications vol. 69 2013.
  18. V.P.and R. P. Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application," IJCEM International journal of Computational Engineering & management, vol. 11, 2011.
  19. A.MISHRA, R. Jaiswal, and S. Sharma, " A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network," presented at the 3rd International Conference on Advance Computing Conference (IACC), 2013
  20. N.-W. Lo and F.-L. Liu, "A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET," in Intelligent Technologies and Engineering Systems. vol. 234, J. Juang and Y.-C. Huang, Eds., ed: Springer New York, 2013, pp. 59-65.
  21. M.A. Gorlatova, P. C. Mason, M. Wang, and L. Lamont, " Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military Communications Conference, IEEE, MILCOM, 2006.
  22. S.Keer and A. Suryavanshi, "To prevent wormhole attacks using wireless protocol in MANET," presented at the nternational Conference on Computer and Communication Technology (ICCCT), 2010.
  23. Z.A.Khan and M. H. Islam, "Wormhole attack: A new detection technique," presented at the international conference on Emerging technologies (ICET), 2012.
  24. M.Yu, M. C. Zhou, and W. Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments," IEEE Transactions on Vehicular Technology, vol. 58
  25. G.Singla, M. S. Sathisha, A. Ranjan, S. D., and P. Kumara, "Implementation of protected routing to defend byzantine attacks for MANET’s,"  International Journal of Advanced Research in Computer Science, vol. 3, p. 109, 2012.
  26. G.Singla and P. Kaliyar, "A Secure Routing Protocol for MANETs Against Byzantine Attacks," Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering, vol. 131, pp. 571-578, 2013.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Firoz Kayum Kajrekar, Dr. C. D. Sonawane, " Safety in Mobile Network Connections, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.280-290, March-April-2018.