Skip to main content

Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

  • 1517 Accesses

Abstract

Ad hoc networks are self-configuring wireless networks without any centralized management. These days, such networks are useful in military application owing to the ease of deployment. The inherent characteristics of these networks introduce new security threats and vulnerabilities that lead to more security attacks as compared to wired and wireless infrastructure networks. For threat identification, a hybrid threat identification methodology is proposed which combines the “Asset centric and Attacker centric” approaches. It takes into account the critical assets present in the network and the adversary capability required for compromising these assets. Further, a vulnerability assessment methodology is proposed under which the network vulnerabilities are analyzed at different levels—Host, Routing Protocol, Node Behavior, and Crypto Algorithms. The proposed methodology has been examined using two different types of scenario-emulated network and real network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Murthy CSR, Manoj BS (2004) Ad hoc wireless networks architectures and protocols. Published by Pearson Education (ISBN 81-297-0945-7)

    Google Scholar 

  2. Sarkar SK, Basavaraju TG, Puttamadappa C (2008) Ad hoc mobile wireless networks principles, protocols, and applications, 22. Aurebach Publications, Taylor & Francis Group

    Google Scholar 

  3. Sen S, Clark JA, Tapiador JE (2010) Security threats in mobile ad hoc networks. J Dept Comput Sci, Univ. of York, UK, 32

    Google Scholar 

  4. Goyal P, Parmar V, Rishi R (2011) MANET: vulnerabilities, challenges, attacks, application. JCEM, 11:32–37

    Google Scholar 

  5. Sangwan S, Jangra A, Goel N (2011) Vulnerabilities and solutions: mobile ad hoc networks for optimal routing and security. J GRCS 2(5):8–12

    Google Scholar 

  6. Yau P-W, Mitchell CJ (2003) Security vulnerabilities in ad hoc networks: research programme of the virtual centre of excellence in mobile & personal communication. In: Proceeding of the 7th ISCTA, 99–104

    Google Scholar 

  7. Spiewak D, Engel T, Fusenig V (2006) Towards a threat model for mobile ad hoc networks. In: Proceeding of the 5th international conference on information security and privacy, 35–40

    Google Scholar 

  8. Clark JA, Murdoch J, McDermid JA, Sen S, Chivers HR, Worthington O, Rohatgi P (2007) Threat modelling for mobile ad hoc and sensor networks. In: ITA conference

    Google Scholar 

  9. Information Security Provider and Research Centre (2011) Threat modelling. www.Praetorian.com

  10. Martin A (2006) A platform independent risk analysis for mobile ad hoc networks. In: Boston university conference on information assurance and cyber security

    Google Scholar 

  11. Chidambaram V (2004) Threat modelling in enterprise architecture integration. SETLabs briefings. EABC 2(4)

    Google Scholar 

  12. Saini R, Khari, M (2011) Defining malicious behavior of a node and its defensive methods in ad hoc networks. JCA, 20(4)

    Google Scholar 

  13. Chayal D, Rathore VS (2011) Assessment of security in mobile ad hoc networks (MANET). J Glob ResComp Sci, 2(6)

    Google Scholar 

  14. Kayarkar H (2012) A survey on security issues in ad hoc routing protocols and their mitigation technequies. Int. J. Adv Netw Appl 03(05):1338–1351

    Google Scholar 

  15. Sen S, Clark JA (2007) Intrusion detection in mobile ad hoc networks: In guide to wireless ad hoc network. In Guide to Wireless Ad Hoc Networks, 53:427–454. Springer Publication, London

    Google Scholar 

  16. Marti S, Giuli TJ (2000) Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings of the 6th ACM international conference on mobile computing and networking (MobiCom), pp 255–265

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richa Tyagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tyagi, R., Sharma, N.K., Malhotra, K., Khosla, A. (2018). Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad hoc Networks. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics