Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security in Mobile AD-HOC Network (MANET)

R. Vassoudhevan, R. Sivagami, Z. Saffna Sarmilla, R. Divya

Abstract


Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the authorisation credentials to participate in the mobile ad hoc network. Internal nodes giving rise to threats can be further divided according to their behaviour — failed, badly failed, selfish and malicious nodes. Failed and selfish nodes are those which do not perform certain operations that the protocol spec- ifies that they should, the former due to some unfore seen failure and the latter due to selfishness to conserve power. Badly failed nodes may perform operations incorrectly, introducing false and misleading information into the network. Malicious nodes may deliberately disrupt the network using a variety of attacks. All categories of node behaviour should be considered when designing protocols for mobile ad hoc networks.

Keywords


security vulnerabilities,Routing

Full Text:

PDF

References


B. Bellur and R. Ogier. A reliable, efficient topology broadcast protocol for dynamic networks. In Proceedings IEEE INFOCOM ’99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, The Future Is Now, 21-25 March, 1999, New York, NY, USA, volume 1, pages 178–186. Institute of Electrical and Electronics Engineers, IEEE Press, 1999.

S. Buchegger and J-Y. Le Boudec. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In J. Hubaux, J. J. Garcia-Luna-Aceves, and D. Johnson, editors, Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, 9-11 June, 2002, Lausanne, Switzerland, 238, pages 226–236. Association for Computing Machinery, ACM Press, 2002.

T. Clausen, G. Hansen, L. Christensen, and G. Behrmann. The optimized link state routing protocol, evaluation through experiments and simulation. In Proceedings 4th International Symposium on Wireless Personal Multimedia Communications, September 9-12, 2001, Aalborg, Denmark, pages 841–846. Institute of Electrical and Electronics Engineers, IEEE Press, 2001.

M. Gerla, X. Hong, and G. Pei. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. In N. Vaidya, M. Corson, and S. Das, editors, Proceedings of the first ACM international symposium on Mobile and ad hoc networking and computing, August 11, 2000, Boston, Massachusetts, USA, 150, pages 11–8. Association for Computing Machinery, ACM Press, 2000.

Z. Haas and M. Pearlman. The performance of query control schemes for the zone routing protocol. In A. Sen and N. Vaidya, editors, Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications, September 2, 1999, Seattle, Washington, USA, 92, pages 23–29. Association for Computing Machinery, ACM Press, 1999.

Z. Haas and M. Pearlman. ZRP a hybrid framework for routing in ad hoc networks. In C. Perkins, editor, Ad Hoc Networking, chapter 7, pages 221–253. Addison-Wesley,2001.

A. Hassan, W. Stark, and J. Hershey. Frequency-hopped spread spectrum in the presence of a follower partial-band jammer. IEEE Transactions on Communications, 41(7):1125–1131, 1993.

Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In To be published in Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, April 1-3, 2003, San Fransisco, CA, USA. Institute of Electrical and Electronics Engineers, IEEE Press, 2003.

D. Johnson, D. Maltz, and J. Broch. DSR the dynamic source routing protocol for multihop wireless ad hoc networks. In C. Perkins, editor, Ad Hoc Networking chapter 5, pages 139–172. Addison-Wesley, 2001.

J. Lundberg. Routing security in ad hoc networks. In Heidi Pehu-Lehtonen Helger Lipmaa, editor, Proceedings of the Helsinki University of Technology Seminar on Network Security, Fall 2000, Helsinki, Finland. Helsinki University of Technology, 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.