SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network

  • C. K. Vanamala
  • G. Raghvendra Rao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 765)


A MANET is a form of the wireless network among the mobile, wireless nodes. The presence of various significant attributes in MANET like end to end communications, dynamic topology and simple setup, leads to difficulties like routing, security, and clustering. Network security is an important aspect for both wired and wireless communication. This paper, provide a detail review on different security attacks over the MANETs. Further discussion is carried out by providing of prior solutions to overcome the security attacks and gives a bench mark for future study. An extensive survey of existing researches towards security in MANET is addressed. Later on, a research gap in current state of art in MANET security is discussed. Especially, this survey study mainly focus on security problems, challenges and solution strategies for security concerns in mobile ad-hoc networks.


MANET OLSR Security attack 


  1. 1.
    Gantes, A., Stucky, J.: A platform on a mobile ad hoc network challenging collaborative gaming. In: International Symposium on Collaborative Technologies and Systems (2008)Google Scholar
  2. 2.
    Khan, K.U.R., Zaman, R.U., Reddy, A.V.G.: Integrating mobile ad hoc networks and the internet challenges and a review of strategies. In: Presented at the 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE (2008)Google Scholar
  3. 3.
    Suguna, M., Subathra, P.: Establishment of stable certificate chains for authentication in mobile ad hoc networks. In: Presented at the International Conference on Recent Trends in Information Technology (ICRTIT) (2011)Google Scholar
  4. 4.
    Nishiyama, H., Ngo, T., Ansari, N., Kato, N.: On minimizing the impact of mobility on topology control in mobile ad hoc networks. IEEE Trans. Wirel. Commun. 11(3), 1158–1166 (2012)CrossRefGoogle Scholar
  5. 5.
    Rango, F.D., Fotino, M., Marano, S.: EE-OLSR: energy efficient OLSR routing protocol for mobile ad-hoc networks. In: Presented at the Military Communications Conference, MILCOM (2008)Google Scholar
  6. 6.
    Du, K., Yang, Y.: Policy-based time slot assignment algorithm in a MANET (PBTSA). In: Presented at the 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID (2009)Google Scholar
  7. 7.
    Sheikh, R., Chande, M.S., Mishra, D.K.: Security issues in MANET: a review. In: Presented at the Seventh International Conference on Wireless and Optical Communications Networks (WOCN) (2010)Google Scholar
  8. 8.
    Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 10, 70–75 (2002)CrossRefGoogle Scholar
  9. 9.
    Papadimitrates, P., Hass, Z.J.: Secure routing for mobile ad hoc networks. In: Proceeding of SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS), San Antonio, TX, (2002)Google Scholar
  10. 10.
    Lou, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: challenges and available solutions. In: Chen, X., Huang, X., Du, D. (eds.) Ad Hoc Wireless Networks, pp. 319–364. Kluwer Academic Publishers, Dordrecht (2003)Google Scholar
  11. 11.
    Yi, S., Kravets, R.: Composite key management for ad hoc networks. In: Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), pp. 52–61 (2004)Google Scholar
  12. 12.
    Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)CrossRefGoogle Scholar
  13. 13.
    Yi, S., Naldurg, P., Kravets, R.: Security aware ad hoc routing for wireless networks. In: Report No. UIUCDCS-R-2290, UIUC (2002)Google Scholar
  14. 14.
    Johnson, D.B., Maltz, A., Broch, J.: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, vol. 5, pp. 139–172. Addison-Wesley, Boston (2001)Google Scholar
  15. 15.
    Gupta, A.K., Sadawarti, H., Verma, A.K.: Performance analysis of AODV, DSR & TORA routing protocols. Int. J. Eng. Technol. 2(2), 226 (2010)Google Scholar
  16. 16.
    He, G.: Destination-sequenced distance vector (DSDV) protocol, pp. 1–9. Networking Laboratory, University of Technology, Helsinki (2002)Google Scholar
  17. 17.
    Perkins, C., B-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561 (2003)Google Scholar
  18. 18.
    Weiss, E., Hiertz, G.R., Xu, B.: Performance analysis of temporally ordered routing algorithm based on IEEE 802.11 a. In: IEEE 61st Vehicular Technology Conference, VTC-Spring, vol. 4. IEEE (2005)Google Scholar
  19. 19.
    Park, V.D., Macker, J.P., Corson, M.S.: Applicability of the temporally-ordered routing algorithm for use in mobile tactical networks. In: 1998 Proceedings of Military Communications Conference, MILCOM 98, vol. 2. IEEE (1998)Google Scholar
  20. 20.
    Yu, F., Huang, M., Tang, H.: Biologically inspired consensus-based spectrum sensing in mobile ad hoc networks with cognitive radios. IEEE Netw. 24(3), 26–30 (2010)CrossRefGoogle Scholar
  21. 21.
    Yang, S., Cheng, H., Wang, F.: Genetic algorithms with immigrants and memory schemes for dynamic shortest path routing problems in mobile ad hoc networks. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(1), 52–63 (2010)CrossRefGoogle Scholar
  22. 22.
    Li, L.-C., Liu, R.-S.: Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans. Wirel. Commun. 9(10), 3072–3081 (2010)CrossRefGoogle Scholar
  23. 23.
    Li, F., Wu, J.: Uncertainty modeling and reduction in MANETs. IEEE Trans. Mob. Comput. 9(7), 1035–1048 (2010)CrossRefGoogle Scholar
  24. 24.
    Bu, S.: Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE Trans. Wirel. Commun. 10(9), 3064–3073 (2011)CrossRefGoogle Scholar
  25. 25.
    E-Defrawy, K., Tsudik, G.: Privacy-preserving location-based on-demand routing in MANETs. IEEE J. Select. Areas Commun. 29(10), 1926–1934 (2011)CrossRefGoogle Scholar
  26. 26.
    Bu, S.: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans. Veh. Technol. 60(3), 1025–1036 (2011)CrossRefGoogle Scholar
  27. 27.
    Dhurandher, S.K.: FACES: friend-based ad-hoc routing using challenges to establish security in magnets systems. IEEE Syst. J. 5(2), 176–188 (2011)CrossRefGoogle Scholar
  28. 28.
    Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRefGoogle Scholar
  29. 29.
    Djahel, S., N-Abdesselam, F., Zhang, Z.: Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun. Surv. Tutor. 13(4), 658–672 (2011)CrossRefGoogle Scholar
  30. 30.
    Xu, G., Borcea, C., Iftode, L.: A policy enforcing mechanism for trusted ad hoc networks. IEEE Trans. Dependable Secure Comput. 8(3), 321–336 (2011)CrossRefGoogle Scholar
  31. 31.
    Chan, A.C.F.: Distributed private key generation for identity-based cryptosystems in ad hoc networks. IEEE Wirel. Commun. Lett. 1(1), 46–48 (2012)CrossRefGoogle Scholar
  32. 32.
    Venkataraman, R., Pushpalatha, M., Rao, T.R.: Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3), 131–140 (2012)CrossRefGoogle Scholar
  33. 33.
    Zhao, Z.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secure Comput. 9(2), 250–260 (2012)CrossRefGoogle Scholar
  34. 34.
    Wei, Z.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9), 4647–4658 (2014)CrossRefGoogle Scholar
  35. 35.
    Vanamala, C.K., Rao, G.R.: Strategic modeling of secure routing decision in OLSR protocol in mobile ad-hoc network. In: Software Engineering Trends and Techniques in Intelligent Systems, pp 201–208 (2017)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information Science and EngineeringNIEMysuruIndia
  2. 2.Department of Computer Science and EngineeringNIEMysuruIndia

Personalised recommendations