Abstract
Mobile ad hoc networks (MANETs) represent a class of networking that is quite essential and different from the traditional systems. Though the use of MANETs is gaining popularity in academic and commercial domains, MANETs have been initially designed to be deployed in areas such as emergency search and rescue operations, military battlefields, and other hostile or challenging environments. Because of the demanding environments that they have to operate in, MANETs do not have well-defined infrastructure unlike wired networks. All the participating nodes in a MANET work via cooperation and hence central coordination is absent. This places an inherent trust among the nodes forming the network in a MANET. Another major consideration regarding MANETs is that they have to often deal with limited resources such as power and bandwidth. These characteristic properties of MANETs make them susceptible to different kinds of attacks which aim to find vulnerabilities in the MANET protocols or target the limited resources. Hence, it becomes essential to recognize these threats and find ways to mitigate and tackle them. This paper will emphasize in understanding threats in ad hoc networks and the approaches to deal with these threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Deng Hongmei, Li Wei, Agrawal Dharma P (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
Chandra P (2011) Bulletproof wireless security: GSM, UMTS, 802.11, and ad hoc securit. Elsevier, Armsterdam
Murthy CSR, Manoj BS (2004) Ad hoc wireless networks: architectures and protocols, portable documents. Pearson Education, London
Zhang Yongguang, Lee Wenke, Huang Yi-An (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556
Li Wenjia, Parker James, Joshi Anupam (2012) Security through collaboration and trust in MANETs. Mob Netw Appl 17(3):342–352
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38–47
Wu B, Chen J, Wu J, Cardei M (2007) A survey on attacks and countermeasures in mobile ad hoc networks. Wireless Network Security. Springer, US, pp 103–135
Kannhavong B, Nakayama H, Nemoto Y, Kato N, Jamalipour A (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91
Hu Yih-Chun, Perrig Adrian, Johnson David B (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24(2):370–380
Anantvalee T, Jie W (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, US, pp 159–180
Nishani L, Biba M (2016) Machine learning for intrusion detection in MANET: a state-of-the-art survey. J Intell Inf Syst 46(2):391–407
Huang Y, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, ACM, New York
Huang YA, Fan W, LeeW, Yu PS (2003, May) Cross-feature analysis for detecting ad-hoc routing anomalies. In: Proceedings of the 23rd international conference on distributed computing systems, IEEE, pp 478–487
Trivedi AK, Kapoor R, Arora R, Sanyal S, Sanyal S (2013) RISM–reputation based intrusion detection system for mobile ad hoc networks. arXiv preprint arXiv:1307.7833
Buchegger S, Le Boudec JY (2002, June) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing, ACM, pp 226–236
Nadeem A, Howarth MP (2014) An intrusion detection and adaptive response mechanism for MANETs. Ad Hoc Netw 13:368–380
Hu YC, Perrig A, Johnson DB (2003, September) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security, ACM, pp 30–40
Prathapani A, Santhanam L, Agrawal DP (2013) Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. J Supercomput 64(3):777–804
Mitrokotsa A, Dimitrakakis C (2013) Intrusion detection in MANET using classification algorithms: the effects of cost and model selection. Ad Hoc Netw 11(1):226–237
Wang SH, Tseng CH, Levitt K, Bishop M (2007, September) Cost-sensitive intrusion responses for mobile ad hoc networks. In: International workshop on recent advances in intrusion detection, Springer, Berlin, Heidelberg, pp 127–145
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Meitei, M.G., Sen, B. (2019). A Study on Few Approaches to Counter Security Breaches in MANETs. In: Sarma, H., Borah, S., Dutta, N. (eds) Advances in Communication, Cloud, and Big Data. Lecture Notes in Networks and Systems, vol 31. Springer, Singapore. https://doi.org/10.1007/978-981-10-8911-4_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-8911-4_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8910-7
Online ISBN: 978-981-10-8911-4
eBook Packages: EngineeringEngineering (R0)