Abstract
Ad hoc networks are self-configuring wireless networks without any centralized management. These days, such networks are useful in military application owing to the ease of deployment. The inherent characteristics of these networks introduce new security threats and vulnerabilities that lead to more security attacks as compared to wired and wireless infrastructure networks. For threat identification, a hybrid threat identification methodology is proposed which combines the “Asset centric and Attacker centric” approaches. It takes into account the critical assets present in the network and the adversary capability required for compromising these assets. Further, a vulnerability assessment methodology is proposed under which the network vulnerabilities are analyzed at different levels—Host, Routing Protocol, Node Behavior, and Crypto Algorithms. The proposed methodology has been examined using two different types of scenario-emulated network and real network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Murthy CSR, Manoj BS (2004) Ad hoc wireless networks architectures and protocols. Published by Pearson Education (ISBN 81-297-0945-7)
Sarkar SK, Basavaraju TG, Puttamadappa C (2008) Ad hoc mobile wireless networks principles, protocols, and applications, 22. Aurebach Publications, Taylor & Francis Group
Sen S, Clark JA, Tapiador JE (2010) Security threats in mobile ad hoc networks. J Dept Comput Sci, Univ. of York, UK, 32
Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. JCEM, 11:32–37
Sangwan S, Jangra A, Goel N (2011) Vulnerabilities and solutions: mobile ad hoc networks for optimal routing and security. J GRCS 2(5):8–12
Yau P-W, Mitchell CJ (2003) Security vulnerabilities in ad hoc networks: research programme of the virtual centre of excellence in mobile & personal communication. In: Proceeding of the 7th ISCTA, 99–104
Spiewak D, Engel T, Fusenig V (2006) Towards a threat model for mobile ad hoc networks. In: Proceeding of the 5th international conference on information security and privacy, 35–40
Clark JA, Murdoch J, McDermid JA, Sen S, Chivers HR, Worthington O, Rohatgi P (2007) Threat modelling for mobile ad hoc and sensor networks. In: ITA conference
Information Security Provider and Research Centre (2011) Threat modelling. www.Praetorian.com
Martin A (2006) A platform independent risk analysis for mobile ad hoc networks. In: Boston university conference on information assurance and cyber security
Chidambaram V (2004) Threat modelling in enterprise architecture integration. SETLabs briefings. EABC 2(4)
Saini R, Khari, M (2011) Defining malicious behavior of a node and its defensive methods in ad hoc networks. JCA, 20(4)
Chayal D, Rathore VS (2011) Assessment of security in mobile ad hoc networks (MANET). J Glob ResComp Sci, 2(6)
Kayarkar H (2012) A survey on security issues in ad hoc routing protocols and their mitigation technequies. Int. J. Adv Netw Appl 03(05):1338–1351
Sen S, Clark JA (2007) Intrusion detection in mobile ad hoc networks: In guide to wireless ad hoc network. In Guide to Wireless Ad Hoc Networks, 53:427–454. Springer Publication, London
Marti S, Giuli TJ (2000) Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings of the 6th ACM international conference on mobile computing and networking (MobiCom), pp 255–265
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tyagi, R., Sharma, N.K., Malhotra, K., Khosla, A. (2018). Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_33
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)