Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Routing Attacks and Security Measures in MANET

A. Preethi, G. Kalpana


Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links routinely used to evaluate and manage trust relationships between network nodes and enhance network security. Due to the lack of a central power, securitizing the routing process becomes a difficult task however trust management frameworks themselves are vulnerable to attacks in which results in performance degradation. The study is to present secure of ad hoc networks from various types of routing attacks and improved by various measures to handle different types of malicious behavior that can be enforced to overcome it.


Ad Hoc Networks, Trust Routing, Routing Attacks, Network Protocols, Network-Level Security and Protection.

Full Text:



I.Chlamtac, M.Conti, and J.Liu, “Mobile Ad Hoc Networking:Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13- 64, 2003.

J.P.Hubaux, L.Buttyan, S.Capkun, “The Quest for Security in Mobile Ad Hoc Networks,” Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), October

B. Kannhavong, H. Nakayama, N.Kato, Y.Nemoto and A.Jamalipour, “Analysis of the Node Isolation Attack Against OLSR-based Mobile Ad Hoc Networks,” Proceedings of the Seventh IEEE International Symposium on Computer Networks (ISCN' 06), pp. 30-35, June 2006.

M.Gerla, X.Hong, L.Ma and G.Pei, “Landmark Routing Protocol (LANMAR) for Large Scale Ad Hoc Networks”, IETF Internet Draft, v.5, November 2002.

C.C.Chiang, H.K.Wu, W.Liu and M.Gerla, “Routing in Clustered Multi Hop Mobile Wireless Networks with Fading Channel,” Proceedings of IEEE SICON 1997, pp. 197-211, April 1997.

C.E.Perkins and E.M.Royer, “Ad Hoc On-Demand Distance Vector Routing,” Proceedings of IEEE Workshop on Mobile Computing Systems and Applications 1999, pp. 90-100, February 1999.

D.B.Jhonson and D.A.Maltz, “Dynamic Source Routing in Ad Hoc wireless Networks,” Mobile Computing, Kluwer Academic Publishers, vol.353, pp. 153-181, 1996.

V.D.Park and M.S.Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Ad Hoc Networks,” Proceedings of IEEE INFOCOM 1997, pp. 1405-1413, April 1997.

I. Chakeres and C. Perkins, “Dynamic MANET On-demand (DYMO) Routing Rrotocol”, IETF Internet Draft, v.15, November 2008, (Work in Progress).

P.Sinha, R.Sivakumar and V.Bharghavan, “CEDAR: A Core Extraction Distributed Ad Hoc Routing Algorithm,” IEEE Journal on Selected Areas in Communications, vol.17, no.8, pp. 1454-1466, August 1999.

Z.J.Haas, “The Routing Algorithm for the Reconfigurable Wireless Networks,” Proceedings of ICUPC 1997, vol. 2,pp. 562-566, October 1997.

P.Yi, Z.Dai, S.Zhang, Y.Zhong, “A New Routing Attack In Mobile Ad Hoc Networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 83-94, 2005.

S.Desilva, and R.V.Boppana, “Mitigating Malicious Control Packet Floods In Ad Hoc Networks,” Proceedings of IEEE Wireless Communications and Networking Conference 2005, vol. -4, pp. 2112- 2117, March 2005.

M. Belding-Royer, Hierarchical routing in ad hoc mobile networks, Wireless Communications and Mobile Computing 2 (5) (2002) 515–532.

E.M. Belding-Royer, Report on the AODV Interop, Technical Report 2002-18, Department of Computer Science, University of California, Santa Barbara, June 2002.

B. Bellur, R. Ogier, A reliable, efficient topology broadcast protocol for dynamic networks, in: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), New York, March 1999, pp. 178–186.

S. Bhargava, D.P. Agrawal, Security enhancements in the AODV protocol for wireless ad hoc networks, in: Proceedings of the Fall 2001 Vehicular Technology Conference, Atlantic City, NJ, October 2001.

V.Balakrishnan, V. Varadharajan, U.K.Tupakula, “Fellowship:Defense Against Flooding And Packet Drop Attacks In MANET,”Network Operations and Management Symposium, NOMS 2006, pp. 1-4, 2006.

S. Gwalani, E.M. Belding-Royer, C.E. Perkins, AODVPA: AODV with path accumulation, in: Proceedings of the IEEE ymposium on Next Generation Internet (NGI) Anchorage, AK, May 2003.

M.A.Shurman, S.M.Yoo, and S.Park, “Black Hole Attack in Mobile Ad Hoc Networks,” ACM Southeast Regional Conference, pp. 96-97,2004.

C.E. Perkins, E.M. Belding- Royer, S.R. Das, Ad hoc On- Demand Distance Vector (AODV) Routing, IETF Internet Draft, draft-ietf-manet-aodv-13.txt, Work in Progress.

Y.C.Hu, A.Perrig and D.Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the ACM Workshop on Wireless Security (WiSe), SanDiego, California, pp.30-40, September 2003.

X.Lin, R.Lu, H.Zhu, P.H.Ho, X.Shen and Z.Cao, “ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks,” IEEE International conference on Communications, ICC '07, pp. 1247 – 1253, June 2007.

T.R.Andel and A.Yasinsac, “The Invisible Node Attack Revisited,” Proceedings of IEEE SoutheastCon 2007, pp. 686 – 691, March 2007.

L.Tamilselvan, V.Sankaranarayanan, “Prevention of Blackhole Attack in MANET,” The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless, pp. 21-26, August 2007.

S.Lee, B.Han, and M.Shin, “Robust Routing in Wireless Adb Hoc Networks,” 2002 International. Conference on Parallel Processing Workshop, Vancouver, Canada, pp. 73-78, August 2002.

M.A.Gorlatova, P.C.Mason, M.Wang, L.Lamont, R. Liscano, “Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis,” Military Communications Conference, MILCOM 2006, pp. 1-7, October 2006.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.