Abstract

Mobile Ad hoc Networks (MANET) due to its unpredictable topology and bandwidth limitations are vulnera ble to attacks. Establishing security measures and find ing secure routes are the major challenges faced by MANET. Security issues faced by ad hoc networks are node a uthentication, insider attack and intrusion detecti on. Implementing security measures is challenging due to the presence of limited resources in the hardware device and the network. Routing protocols attempt to mitig ate the attacks by isolating the malicious nodes. In this study, a survey of various kinds of attacks against MANET is studied. It is also proposed to study modificati on of AODV and DSR routing protocol implementation with regard to mitigating attacks and intrusion detection . This study studied various approaches to predict and mit igate attacks in MANET.

Highlights

  • Mobile Ad Hoc Network (MANET) depends upon all the available nodes for routing of data packets, service discovery in the network due to the limited range of transmission

  • Mobile Ad hoc Networks (MANET) due to its unpredictable topology and bandwidth limitations are vulnerable to attacks

  • This study studied various approaches to predict and mitigate attacks in MANET

Read more

Summary

INTRODUCTION

Mobile Ad Hoc Network (MANET) depends upon all the available nodes for routing of data packets, service discovery in the network due to the limited range of transmission. The source on receiving several routes picks up the shortest route and sends along the data packet along that path Route metrics such as the number of hops, delay, bandwidth and the time taken for the Reply to reach the source are all taken into consideration by the source node while selecting route and storing it in its cache. The source node removes the route containing the broken link from its cache and uses another route for the destination or starts a route discovery process. Corresponding Author: Manikandan, S.P., Department of Computer Science and Engineering, Faculty of Engineering, Anna University of Technology, Coimbatore, India. AODV uses hello messages and sequence number as in DSDV and the route discovery process is similar to DSR. Explore several DSR and AODV routing protocol implementation with regard to intrusion detection and mitigating attacks

Attacks in MANET
Intrusion Detection Systems
Secure Routing
Mitigating Attacks
RESULTS
DISCUSSION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.