Skip to main content

A Study on Few Approaches to Counter Security Breaches in MANETs

  • Conference paper
  • First Online:
Advances in Communication, Cloud, and Big Data

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 31))

Abstract

Mobile ad hoc networks (MANETs) represent a class of networking that is quite essential and different from the traditional systems. Though the use of MANETs is gaining popularity in academic and commercial domains, MANETs have been initially designed to be deployed in areas such as emergency search and rescue operations, military battlefields, and other hostile or challenging environments. Because of the demanding environments that they have to operate in, MANETs do not have well-defined infrastructure unlike wired networks. All the participating nodes in a MANET work via cooperation and hence central coordination is absent. This places an inherent trust among the nodes forming the network in a MANET. Another major consideration regarding MANETs is that they have to often deal with limited resources such as power and bandwidth. These characteristic properties of MANETs make them susceptible to different kinds of attacks which aim to find vulnerabilities in the MANET protocols or target the limited resources. Hence, it becomes essential to recognize these threats and find ways to mitigate and tackle them. This paper will emphasize in understanding threats in ad hoc networks and the approaches to deal with these threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Deng Hongmei, Li Wei, Agrawal Dharma P (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75

    Article  Google Scholar 

  2. Chandra P (2011) Bulletproof wireless security: GSM, UMTS, 802.11, and ad hoc securit. Elsevier, Armsterdam

    Google Scholar 

  3. Murthy CSR, Manoj BS (2004) Ad hoc wireless networks: architectures and protocols, portable documents. Pearson Education, London

    Google Scholar 

  4. Zhang Yongguang, Lee Wenke, Huang Yi-An (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556

    Article  Google Scholar 

  5. Li Wenjia, Parker James, Joshi Anupam (2012) Security through collaboration and trust in MANETs. Mob Netw Appl 17(3):342–352

    Article  Google Scholar 

  6. Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38–47

    Article  Google Scholar 

  7. Wu B, Chen J, Wu J, Cardei M (2007) A survey on attacks and countermeasures in mobile ad hoc networks. Wireless Network Security. Springer, US, pp 103–135

    Chapter  Google Scholar 

  8. Kannhavong B, Nakayama H, Nemoto Y, Kato N, Jamalipour A (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91

    Article  Google Scholar 

  9. Hu Yih-Chun, Perrig Adrian, Johnson David B (2006) Wormhole attacks in wireless networks. IEEE J Sel Areas Commun 24(2):370–380

    Article  Google Scholar 

  10. Anantvalee T, Jie W (2007) A survey on intrusion detection in mobile ad hoc networks. Wireless Network Security. Springer, US, pp 159–180

    Chapter  Google Scholar 

  11. Nishani L, Biba M (2016) Machine learning for intrusion detection in MANET: a state-of-the-art survey. J Intell Inf Syst 46(2):391–407

    Article  Google Scholar 

  12. Huang Y, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, ACM, New York

    Google Scholar 

  13. Huang YA, Fan W, LeeW, Yu PS (2003, May) Cross-feature analysis for detecting ad-hoc routing anomalies. In: Proceedings of the 23rd international conference on distributed computing systems, IEEE, pp 478–487

    Google Scholar 

  14. Trivedi AK, Kapoor R, Arora R, Sanyal S, Sanyal S (2013) RISM–reputation based intrusion detection system for mobile ad hoc networks. arXiv preprint arXiv:1307.7833

  15. Buchegger S, Le Boudec JY (2002, June) Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing, ACM, pp 226–236

    Google Scholar 

  16. Nadeem A, Howarth MP (2014) An intrusion detection and adaptive response mechanism for MANETs. Ad Hoc Netw 13:368–380

    Article  Google Scholar 

  17. Hu YC, Perrig A, Johnson DB (2003, September) Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proceedings of the 2nd ACM workshop on wireless security, ACM, pp 30–40

    Google Scholar 

  18. Prathapani A, Santhanam L, Agrawal DP (2013) Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. J Supercomput 64(3):777–804

    Article  Google Scholar 

  19. Mitrokotsa A, Dimitrakakis C (2013) Intrusion detection in MANET using classification algorithms: the effects of cost and model selection. Ad Hoc Netw 11(1):226–237

    Article  Google Scholar 

  20. Wang SH, Tseng CH, Levitt K, Bishop M (2007, September) Cost-sensitive intrusion responses for mobile ad hoc networks. In: International workshop on recent advances in intrusion detection, Springer, Berlin, Heidelberg, pp 127–145

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moirangthem Goldie Meitei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Meitei, M.G., Sen, B. (2019). A Study on Few Approaches to Counter Security Breaches in MANETs. In: Sarma, H., Borah, S., Dutta, N. (eds) Advances in Communication, Cloud, and Big Data. Lecture Notes in Networks and Systems, vol 31. Springer, Singapore. https://doi.org/10.1007/978-981-10-8911-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8911-4_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8910-7

  • Online ISBN: 978-981-10-8911-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics