Abstract

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Highlights

  • Mobile Ad hoc Network (MANET) is defined as a network without infrastructure, meaning a network without the usual routing infrastructure like fixed routers and routing backbones

  • The malicious nodes that have reactive attack acting can be treated by using some security protocols that they are involved some type of cryptographic methods

  • The main goal of this study is to show introductory to the different types of attack, securing routing and of forwarding packets protocols

Read more

Summary

INTRODUCTION

Mobile Ad hoc Network (MANET) is defined as a network without infrastructure, meaning a network without the usual routing infrastructure like fixed routers and routing backbones It composes of a number of nodes that connect on wireless medium with each other in a specified range zone. Corresponding Author: Salwa Aqeel Mahdi, Department of Communication Tech and Network, Faculty of Computer Science and Information Technology, University Putra Malaysia, Malaysia To face these attacks many new security protocols have been appeared to remove these endangered attacks and obtained MANET securities. The malicious nodes that have reactive attack acting can be treated by using some security protocols that they are involved some type of cryptographic methods. There are many protocols appeared to secure Mobile Ad Hoc routing and packet forwarding that it is focused on different types of the attack. The main goal of this study is to show introductory to the different types of attack, securing routing and of forwarding packets protocols

Mobile Ad Hoc Attacks
Black Hole Attack
Rushing Attack
Jellyfish Attack
Wormhole Attack
Securing Routing Discovery Protocols
Ariadne
1.14. Appalls
1.20. Securing OLSR
1.22. Secure Forwarding Packet
1.27. Context Free Protocol
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call