Share This Article:

Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS

Abstract Full-Text HTML Download Download as PDF (Size:3116KB) PP. 365-372
DOI: 10.4236/ijcns.2014.79038    3,747 Downloads   4,777 Views   Citations
Author(s)    Leave a comment

ABSTRACT

Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network and System Sciences, 7, 365-372. doi: 10.4236/ijcns.2014.79038.

References

[1] Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor and Ubiquiotus Computing, 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
[2] Ju, K. and Chung, K. (2012) Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi Hop Tactical Networks. International Journal of Security and Its Applications, 6, 149-154.
[3] Nguyan, D., Zhao, L., Uisawang, P. and Platt, J. (2000) Security Routing Analysis for Mobile Ad-Hoc Networks. Interdisciplinary Telecommunications Program of Colorado University.
[4] Habib, A., Hefeeda, M. and Bhargava, B. (2003) Detecting Service Violations and DoS Attacks. The 10th Annual Network and Distributed System Security Symposium, San Diego, 177189.
[5] Lackner, G. (2013) Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi, and WiMAX. International Journal of Network Security, 15, 420-436.
[6] Jain, R. and Nguyen, T. (2009) A Survey of WiMAX Security Threats. Project Report.
[7] Li, W.J., Parker, J. and Joshi, A. (2012) Security through Collaboration and Trust in MANETs. Mobile Networks & Applications, 17, 342. http://dx.doi.org/10.1007/s11036-010-0243-9
[8] Samreen, S. and Narasimha, G. (2013) An Efficient Security Mechanism to Detect Packet Droppers in a MANET under Individual and Collusive Adversarial Models. International Journal of Computer Applications, 82, 39.
[9] Mandal, J.K. and Lutful Hassan, K. (2013) A Novel Technique to Detect Intrusion in MANET. International Journal of Network Security & Its Applications, 5, 179.
http://dx.doi.org/10.5121/ijnsa.2013.5515
[10] Padmaja, G.M. and Lakshmi, Ch.R. (2012) Analyzing the Detection of Active Attacks in Wireless Mobile Networks. International Journal of Reviews in Computing, 9, 34.
[11] Shah, V. and Modi, N.K. (2012) A Comparative Analysis of Network Layer Threats & Defense Mechanisms of MANETs. International Journal of Advanced Research in Computer Science, 3, 160.
[12] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocols’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
[13] Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Proceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Illinois, 25-27 May 2005.
[14] OPNET Corporation www.opnet.com
[15] Cavin, D., Sasson, Y. and Schiper, A. (2002) On the Accuracy of MANET Simulators. Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, ACM Press, Toulouse, 38-43. http://dx.doi.org/10.1145/584490.584499

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.