A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks

A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks

Jhum Swain (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University (Deemed), Bhubaneswar, Odisha, India), and Bibudhendu Pati (Department of Computer Science and Engineering, C. V. Raman College of Engineering, Bhubaneswar, India)
Copyright: © 2018 |Pages: 8
DOI: 10.4018/IJISP.2018040103
OnDemand PDF Download:
No Current Special Offers


A Mobile Ad Hoc Networks (MANETs) is an assortment of a variety of portable nodes that are linked collectively in a greater number in a wireless medium that has no permanent infrastructure. Here, all the nodes in the network act as both router and host and is in charge for accelerating and forwarding packets to other nodes. Due to the frequent link failure and high speed of mobile nodes, there are many challenges in MANET. As security is the basic challenge in a MANET, this article discusses the various protocols developed for security issues in MANET and IoT and presents a comparative analysis on their performance. After detailed analysis and comparison, it was observed that when security features are imposed at different levels during routing, various protocols perform in different ways. Also, the network performance and network life times vary from one approach to another. So, this article also presents the effect of security features on data drop and delay of prominent protocols after simulation.
Article Preview

This section presents a detail study and review of advanced approaches proposed by eminent researchers in this field of security in MANET. Transmission of audio data with secured mechanism has been discussed in Athulya and Sheeba’s work (2012) where the authors have provided dual safety measures by encrypting and decrypting the audio at each node in the route using stream ciphering method. Security threats and their possible solutions have been discussed in Jan Von Mulert, Ian Weich and Winston K.G. Seah’s research (2012), and it also focuses on how modification of data is done using optimization technique for security. Praveen Joshi (2011) discusses about the various security problems and how to prevent them which are adopted in the network layer. Spoofing attack and their prevention techniques has been discussed in Yuseok, Tae-Hyung, and Jong’s (2012) work. The author proposed a model i.e. PBM (Policy Based Management) that deals with 4 entities in (Bostjancic & Timecenko) such as QoS, network resources, configuration and security. It has discussed about the vulnerability, challenges and security attacks on ad-hoc routing protocols. A bargained hub may disregard the secrecy rule of security and uncover vital data like private and open keys, status of hub, passwords, ideal course to approved hubs, geographic area of hubs and other control information in parcel headers to unapproved hubs introduce in the system (Dhivya, Karthik & Kumaran). A secured on-demand routing protocol has been proposed in (Wan, Ren, & Gu) that prevents various attacks in MANET and another regression based trust model for MANET has been implemented in (Venkataraman, Pushpalatha, & Rao, 2012) that ensures guaranteed packet delivery in wireless medium. Marchang and Datta (2012) proposed a light weight trust based routing protocol that prevents any external attacks in MANET and a mobile agent based secured platform has been designed in (Rath & Pattanayak, 2017) that ensures improved network life time with better throughput when compared with other similar approaches.

Complete Article List

Search this Journal:
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing