Security Challenges, Threats and the Countermeasures in Mobile Ad hoc Networks: A Review

Authors

  • Samia Khan  Department of Computer & Communication systems, Faculty of Engineering, Universiti Putra Malaysia (UPM), Serdang, Selangor Darul Ehsan, Malaysia

Keywords:

Mobile Ad hoc Networks, Black hole attacks, Security Attacks.

Abstract

A moveable network is self-configurable network in which moveable nodes message with each other with the help of wireless connections without any specified environment. MANETs are becoming a widely known technology for delivering pervasive computing environment. There has been a rapid growth in the adoption of MANETs over last few decades for providing the smart environment. With all these advancements, comes the issue of security in MANETs. The security is a big issue and the chances of having susceptibility to various attacks. It analyses the effects of black hole attacks on the network evaluation. This paper reviews the impact of Blackhole Attacks in Mobile Ad Hoc Networks and various countermeasures for this type of attack.

References

  1. Wang, Fei-Yue, and Derong Liu. "Networked control systems." Theory and Applications, Springer-Verlag, London (2008).
  2. Halim, Tasneem, and Md Rafiqul Islam. "A study on the security issues in WSN." International Journal of Computer Applications 53, no. 1 (2012).
  3. Oh, Jong-Ha, Sung-Sik Jang, and Tae-Young Byun. "A Centralized Cluster Head Selection Scheme for Reducing Discrepancy among Clusters over WSN." In Embedded and Multimedia Computing Technology and Service, pp. 699-706. Springer Netherlands, 2012.
  4. Kaur, Simranpreet, Rupinderdeep Kaur, and A. K. Verma. "Jellyfish attack in MANETs: A review." In Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on, pp. 1-5. IEEE, 2015.
  5. Chauhan, R. K. "An assessment based approach to detect black hole attack in MANET." In Computing, Communication & Automation (ICCCA), 2015 International Conference on, pp. 552-557. IEEE, 2015.
  6. Rmayti, M., Youcef Begriche, Rida Khatoun, Lyes Khoukhi, and Dominique Gaiti. "Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers." In Communications and Vehicular Technology in the Benelux (SCVT), 2014 IEEE 21st Symposium on, pp. 7-12. IEEE, 2014.
  7. Sardana, Anjali, Tushina Bedwal, Akanksha Saini, and Radhika Tayal. "Black hole attack's effect mobile ad-hoc networks (MANET)." In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in, pp. 966-970. IEEE, 2015.
  8. Singh, Ajay Vikram, and Moushumi Chattopadhyaya. "Mitigation of DoS attacks by using multiple encryptions in MANETs." In Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on, pp. 1-6. IEEE, 2015.
  9. Kumar, Sandeep, and Suman Sangwan. "A Survey of Black Hole Detection Techniques in WSNs." International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 5, May 2015.
  10. Sasi, Swapna B., Dila Dixon, Jesmy Wilson, and Page No. "A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security." IOSR Journal of Engineering 4, no. 3 (2014): 1.
  11. Bao, Fenye, Ray Chen, MoonJeong Chang, and Jin-Hee Cho. "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection." IEEE transactions on network and service management 9, no. 2 (2012): 169-183.
  12. SenthilKumar, U. SenthilKumaran1 MK Nallakaruppan2M, and U. Senthilkumaran. "Review of asymmetric key cryptography in wireless sensor networks." International Journal of Engineering and Technology 8, no. 2 (2016): 859-862.
  13. Watro, Ronald, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus. "TinyPK: securing sensor networks with public key technology." In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59-64. ACM, 2004.
  14. Aman, Kumar, Jakhar Sudesh, and Makkar Sunil. "Comparative Analysis between DES and RSA Algorithm." International Journal of Advanced Research in Computer Science and Software Engineering 2 (2012): 386-389.
  15. Baadache, Abderrahmane, and Ali Belmehdi. "Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks." arXiv preprint arXiv:1002.1681 (2010).
  16. Akyildiz, Ian F., Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. "A survey on sensor networks." IEEE Communications magazine 40, no. 8 (2002): 102-114.
  17. Kamra, Abhinav, Vishal Misra, Jon Feldman, and Dan Rubenstein. "Growth codes: Maximizing sensor network data persistence." In ACM SIGCOMM Computer Communication Review, vol. 36, no. 4, pp. 255-266. ACM, 2006.
  18. Bajaj, Sumeet, and Radu Sion. "Trusteddb: A trusted hardware-based database with privacy and data confidentiality." IEEE Transactions on Knowledge and Data Engineering 26, no. 3 (2014): 752-765.
  19. Tamilselvan, Latha, and V. Sankaranarayanan. "Prevention of blackhole attack in MANET." In Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on, pp. 21-21. IEEE, 2007.

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Samia Khan, " Security Challenges, Threats and the Countermeasures in Mobile Ad hoc Networks: A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.47-55, March-April-2018.