Security: A Core Issue in Mobile Ad hoc Networks

DOI: 10.4236/jcc.2015.312005   PDF   HTML   XML   4,403 Downloads   5,472 Views   Citations

Abstract

Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless links for communication. Wireless networks are considered more exposed to security attacks as compared to wired networks, especially; MANETs are the soft target due to vulnerable in nature. Lack of infrastructure, open peer to peer connectivity, shared wireless medium, dynamic topology and scalability are the key characteristics of MANETs which make them ideal for security attacks. In this paper, we shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis of network attacks. Finally, we shall propose solutions to meet the security challenges, according to our framed security criteria.

Share and Cite:

Shabbir, A. , Khalid, F. , Shaheed, S. , Abbas, J. and Zia-Ul-Haq, M. (2015) Security: A Core Issue in Mobile Ad hoc Networks. Journal of Computer and Communications, 3, 41-66. doi: 10.4236/jcc.2015.312005.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Conti, M. (2003) Body, Personal, and Local Ad Hoc Wireless Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 3-24.
[2] Weiser, M. (1991) The Computer for the Twenty-First Century. Scientific American, 265, 94-104.
[3] Perkins, C.E. (2001) Ad Hoc Networking. Addison-Wesley, Reading.
[4] Corson, M.S., Macker, J.P. and Cirincione, G.H. (1999) Internet-Based Mobile Ad Hoc Networking. IEEE Internet Computing, 3, 63-70.
http://dx.doi.org/10.1109/4236.780962
[5] Macker, J. (1999) Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501, January1999.
[6] Johnson, D.B. and Maltz, D.A. (1996) Dynamic Source Routing in Ad Hoc Wireless Networks. In: Imielinski, T. and Korth, H.F., Eds., Mobile Computing, Springer, New York, 153-181.
http://dx.doi.org/10.1007/978-0-585-29603-6_5
[7] Perkins, C., Belding-Royer, E. and Das, S. (2003) Ad Hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, July 2003.
[8] Gellens, R. (1999) Wireless Device Configuration (OTASP/OTAPA) via ACAP.
[9] Perkins, C.E. and Bhagwat, P. (1994) Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM Computer Communication Review, 24, 234-244.
http://dx.doi.org/10.1145/190809.190336
[10] Mishra, A. and Nadkarni, K.M. (2003) Security in Wireless Ad Hoc Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 499-549.
[11] Yang, H., Luo, H., Ye, F., Lu, S. and Zhang, L. (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 11, 38-47.
http://dx.doi.org/10.1109/MWC.2004.1269716
[12] Raffo, D., Adjih, C., Clausen, T. and Mühlethaler, P. (2005) Securing OLSR Using Node Locations. Proceedings of the 11th European Wireless Conference 2005—Next Generation Wireless and Mobile Communications and Services (European Wireless), Nicosia, 10-13 April 2005, 1-7.
[13] Myers, A.D. and Basagni, S. (2002) Wireless Media Access Control. In: Stojmenovic, I., Ed., Handbook of Wireless Networks and Mobile Computing, John Wiley & Sons, Inc., New York, 119.
http://dx.doi.org/10.1002/0471224561.ch6
[14] Zhang, Y., Lee, W. and Huang, Y.A. (2003) Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9, 545-556.
http://dx.doi.org/10.1023/A:1024600519144
[15] Perkins, C.E. (2001) Ad Hoc Networking: An Introduction. Ad Hoc Networking, 40, 20-22.
[16] Papadimitratos, P. and Haas, Z.J. (2002) Securing Mobile Ad Hoc Networks. In: Ilyas, M., Ed., The Handbook of Ad Hoc Wireless Networks, CRC Press, Inc., Boca Raton, 665-671.
http://dx.doi.org/10.1201/9781420040401.ch31
[17] Zhou, L. and Haas, Z.J. (1999) Securing Ad Hoc Networks. IEEE Network, 13, 24-30.
http://dx.doi.org/10.1109/65.806983
[18] Vinayakray-Jani, P. (2002) Security within Ad Hoc Networks. Proceeding of the PAMPAS Workshop, London, 16-17 September 2002.
[19] Biswas, K. and Ali, M.L. (2007) Security Threats in Mobile Ad-Hoc Network. Master’s Thesis, Department of Interaction and System Design School of Engineering, Blekinge, 9-26.
[20] Woo, S.C.M. and Singh, S. (2001) Scalable Routing Protocol for Ad Hoc Networks. Wireless Networks, 7, 513-529.
http://dx.doi.org/10.1023/A:1016726711167
[21] Parker, J. (2006) Discussion Record for the 1st MANET Reading Group Meeting. February.
[22] Viennot, L., Jacquet, P. and Clausen, T.H. (2004) Analyzing Control Traffic Overhead versus Mobility and Data Traffic Activity in Mobile Ad-Hoc Network Protocols. Wireless Networks, 10, 447-455.
http://dx.doi.org/10.1023/B:WINE.0000028548.44719.fe
[23] Amitabh, M. (2008) Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press, Cambridge.
[24] Gokhale, V., Ghosh, S. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey. In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 195-225.
http://dx.doi.org/10.1201/EBK1439819197-12
[25] Papadimitratos, P. and Haas, Z.J. (2003) Secure Link State Routing for Mobile Ad Hoc Networks. IEEE Symposium on Applications and the Internet, 27-31 January 2003, 379-383.
[26] Ilyas, M., Ed. (2002) The Handbook of Ad Hoc Wireless Networks. CRC Press, Boca Raton.
[27] Burg, A. (2003) Ad Hoc Network Specific Attacks. In: Seminar Ad Hoc Networking: Concepts, Applications, and Security, Technische Universitat Munchen, Munich.
[28] Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C. and Royer, E.M.B. (2002) A Secure Routing Protocol for Ad Hoc Networks. Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, 12-15 November 2002, 78-87.
http://dx.doi.org/10.1109/icnp.2002.1181388
[29] Li, H., Chen, Z., Qin, X., Li, C. and Tan, H. (2002) Secure Routing in Wired Networks and Wireless Ad Hoc Networks. Technical Report, Department of Computer Science, University of Kentucky, Lexington.
[30] William, S. and Stallings, W. (2006) Cryptography and Network Security: For VTU, 4/e. Pearson Education, India.
[31] Rajavaram, S., Shah, H., Shanbhag, V., Undercoffer, J. and Joshi, A. (2002) Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks. In: Proceedings of the Student Research Conference, University of Maryland at Baltimore County (UMBC), Baltimore County.
[32] Douligeris, C. and Mitrokotsa, A. (2004) DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 44, 643-666.
http://dx.doi.org/10.1016/j.comnet.2003.10.003
[33] Perkins, C. (1998) Ad Hoc On-Demand Distance Vector (AODV) Routing. IEEE Internet Computing, 2, 58-69.
[34] DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., et al. (2001) Secure Group Communications for Wireless Networks. Proceedings of the IEEE Military Communications Conference, Communications for Network-Centric Operations: Creating the Information Force, 1, 113-117.
[35] Sun, B., Wu, K. and Pooch, U.W. (2004) Towards Adaptive Intrusion Detection in Mobile Ad Hoc Networks. Proceedings of the IEEE Global Telecommunications Conference, 6, 3551-3555.
[36] Florian, D. (2008) Security Concepts for Robust and Highly Mobile Ad-hoc Networks. April.
[37] Lee, S., Han, B. and Shin, M. (2002) Robust Routing in Wireless Ad Hoc Networks. Proceedings of the International Conference on Parallel Processing Workshops, Vancouver, 20-23 August 2002, 73-78.
[38] Lazos, L., Liu, S. and Krunz, M. (2009) Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. Proceedings of the Second ACM Conference on Wireless Network Security, Zurich, 16-19 March 2009, 169-180.
http://dx.doi.org/10.1145/1514274.1514299
[39] Noubir, G. and Lin, G.L. (2003) Low-Power DoS Attacks in Data Wireless LANs and Countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7, 29-30.
http://dx.doi.org/10.1145/961268.961277
[40] Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, 46-57.
http://dx.doi.org/10.1145/1062689.1062697
[41] Xu, W., Wood, T., Trappe, W. and Zhang, Y. (2004) Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, ACM Press, New York, 80-89.
http://dx.doi.org/10.1145/1023646.1023661
[42] Wood, A.D., Stankovic, J. and Son, S.H. (2003) JAM: A Jammed-Area Mapping Service for Sensor Networks. Proceedings of the 24th IEEE Real-Time Systems Symposium, Cancun, 3-5 December 2003, 286-297.
http://dx.doi.org/10.1109/REAL.2003.1253275
[43] Pullen, J. and Wood, D. (1995) Networking Technology and DIS. Proceedings of the IEEE, 83, 1156-1167.
[44] Omura, J.K. (1994) Spread Spectrum Communications Handbook. Volume 2, McGraw-Hill, New York.
[45] Fadlullah, Z.M., Taleb, T. and Scholler, M. (2010) Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs). In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 173.
http://dx.doi.org/10.1201/ebk1439819197-11
[46] Gokhale, V., Ghosh, S.K. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks. In: Pathan, A.S.K., Ed., Security of Self-Organizing Networks, MANET, WSN, WMN, VANET, Auerbach Publications, Boston, 195-225. http://dx.doi.org/10.1201/EBK1439819197-12
[47] Feldman, M., Papadimitriou, C., Chuang, J. and Stoica, I. (2006) Free-Riding and Whitewashing in Peer-to-Peer Systems. IEEE Journal on Selected Areas in Communications, 24, 1010-1019.
http://dx.doi.org/10.1109/JSAC.2006.872882
[48] Johnson, D.B. (2003) The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks.
[49] Zhang, Y. and Lee, W. (2005) Security in Mobile Ad-Hoc Networks. In: Mohapatra, P. and Krishnamurthy, S.V., Eds., Ad Hoc Networks, Springer, New York, 249-268.
http://dx.doi.org/10.1007/0-387-22690-7_9
[50] Gupta, V., Krishnamurthy, S. and Faloutsos, M. (2002) Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. Proceedings of the IEEE MILCOM, 2, 1118-1123.
http://dx.doi.org/10.1109/milcom.2002.1179634
[51] Kyasanur, P. and Vaidya, N.H. (2003) Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Proceedings of the 2003 International Conference on Dependable Systems and Networks, San Francisco, 22-25 June 2003, 173-182.
http://dx.doi.org/10.1109/dsn.2003.1209928
[52] Radosavac, S., Benammar, N. and Baras, J.S. (2004) Cross-Layer Attacks in Wireless Ad Hoc Networks. Proceedings of the 2004 Conference on Information Sciences and Systems, Princeton, 17-19 March 2004, 1266-1271.
[53] Zimmermann, H. (1980) OSI Reference Model—The ISO Model of Architecture for Open Systems Interconnection. IEEE Transactions on Communications, 28, 425-432.
http://dx.doi.org/10.1109/TCOM.1980.1094702
[54] Lou, W. and Fang, Y. (2004) A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions. In: Cheng, X.Z., Huang, X. and Du, D.-Z., Eds., Ad Hoc Wireless Networking, Springer, New York, 319-364.
http://dx.doi.org/10.1007/978-1-4613-0223-0_9
[55] Hu, Y.C. and Perrig, A. (2004) A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, 2, 28-39.
http://dx.doi.org/10.1109/MSP.2004.1
[56] Gideon, N. and Edwin, B.K. (2014) Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances. International Journal of Computer Science & Information Technology (IJCSIT), 6, 1-19.
[57] Yi, S., Naldurg, P. and Kravets, R. (2001) Security-Aware Ad Hoc Routing for Wireless Networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, ACM Press, New York, 299-302.
http://dx.doi.org/10.1145/501416.501464
[58] Saini, A. and Kumar, H. (2010) Effect of Black Hole Attack on AODV Routing Protocol in MANET. International Journal of Information Technology, Modeling and Computing (IJITMC), 2, 9-17.
[59] Li, W. and Joshi, A. (2008) Security Issues in Mobile Ad Hoc Networks—A Survey. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 1-23.
[60] Jawandhiya, P.M., Ghonge, M.M., Ali, M.S. and Deshpande, J.S. (2010) A Survey of Mobile Ad Hoc Network Attacks. International Journal of Engineering Science and Technology, 2, 4063-4071.
[61] Chirala, A.P. (2010) Analysis and Diminution of Security Attacks on Mobile Ad Hoc Network. IJCA Special Issue on “Mobile Ad-Hoc Networks”, MANETs, 105-110.
[62] Adjih, C., Raffo, D. and Mühlethaler, P. (2005) Attacks against OLSR: Distributed Key Management for Security. Proceedings of the 2nd OLSR Interop/Workshop, Palaiseau, 28-29 July 2005.
[63] Kannhavong, B., Nakayama, H., Kato, N., Nemoto, Y. and Jamalipour, A. (2006) Analysis of the Node Isolation Attack against OLSR-Based Mobile Ad Hoc Networks. Proceedings of the 2006 International Symposium on Computer Networks, Istanbul, 16-18 June 2006, 30-35.
http://dx.doi.org/10.1109/iscn.2006.1662504
[64] Yi, P., Dai, Z., Zhang, S. and Zhong, Y. (2005) A New Routing Attack in Mobile Ad Hoc Networks. International Journal of Information Technology, 11, 83-94.
[65] Kim, K. and Kim, S. (2007) A Sinkhole Detection Method Based on Incremental Learning in Wireless Ad Hoc Networks.
[66] Hu, Y.C., Perrig, A. and Johnson, D.B. (2003) Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In: Proceedings of the 2nd ACM Workshop on Wireless Security, ACM Press, New York, 30-40.
http://dx.doi.org/10.1145/941311.941317
[67] Desilva, S. and Boppana, R.V. (2005) Mitigating Malicious Control Packet Floods in Ad Hoc Networks. Proceedings of the IEEE Wireless Communications and Networking Conference, 4, 2112-2117.
http://dx.doi.org/10.1109/wcnc.2005.1424844
[68] Mishra, A., Nadkarni, K. and Patcha, A. (2004) Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications, 11, 48-60.
http://dx.doi.org/10.1109/MWC.2004.1269717
[69] Hu, Y.C., Johnson, D.B. and Perrig, A. (2003) SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks, 1, 175-192.
http://dx.doi.org/10.1016/S1570-8705(03)00019-2
[70] Jou, Y.F., Gong, F., Sargor, C., Wu, X., Wu, S.F., Chang, H.C. and Wang, F.Y. (2000) Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure. Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, 25-27 January 2000, 69-83.
[71] Douceur, J.R. (2002) The Sybil Attack. In: Peer-to-Peer Systems, Springer, Berlin Heidelberg, 251-260.
http://dx.doi.org/10.1007/3-540-45748-8_24
[72] Chan, E.Y., Chan, H.W., Chan, K.M., Chan, V.P., Chanson, S.T., Cheung, M.M., et al. (2004) IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Networks, Hong Kong, 10-12 May 2004, 581-586.
http://dx.doi.org/10.1109/ISPAN.2004.1300541
[73] Brutch, P. and Ko, C. (2003) Challenges in Intrusion Detection for Wireless Ad-Hoc Networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops, Orlando, 27-31 January 2003, 368-373.
http://dx.doi.org/10.1109/saintw.2003.1210188
[74] Parker, J., Patwardhan, A. and Joshi, A. (2006) Cross-Layer Analysis for Detecting Wireless Misbehavior. Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, 8-10 January 2006, 6-9.
http://dx.doi.org/10.1109/ccnc.2006.1592977
[75] Zhang, Y., Lee, W. and Huang, Y.A. (2003) Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks, 9, 545-556.
http://dx.doi.org/10.1023/A:1024600519144
[76] Perrig, A., Canetti, R., Tygar, J.D. and Song, D. (2000) Efficient Authentication and Signing of Multicast Streams over Lossy Channels. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, 14-17 May 2000, 56-73.
http://dx.doi.org/10.1109/SECPRI.2000.848446
[77] Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM Press, New York, 255-265.
http://dx.doi.org/10.1145/345910.345955
[78] Hu, Y.C., Perrig, A. and Johnson, D.B. (2003) Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 3, 1976-1986.
http://dx.doi.org/10.1109/infcom.2003.1209219
[79] Huang, Y.A. and Lee, W. (2003) A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM Press, New York, 135-147.
http://dx.doi.org/10.1145/986858.986877
[80] Hu, Y.C., Perrig, A. and Johnson, D.B. (2006) Wormhole Attacks in Wireless Networks. IEEE Journal on Selected Areas in Communications, 24, 370-380.
http://dx.doi.org/10.1109/JSAC.2005.861394
[81] Awerbuch, B., Holmer, D., Nita-Rotaru, C. and Rubens, H. (2002) An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: Proceedings of the 1st ACM Workshop on Wireless Security, ACM Press, New York, 21-30.
http://dx.doi.org/10.1145/570681.570684
[82] Dhillon, D., Zhu, J., Richards, J. and Randhawa, T. (2006) Implementation & Evaluation of an IDS to Safeguard OLSR Integrity in MANETs. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, ACM Press, New York, 45-50.
http://dx.doi.org/10.1145/1143549.1143560
[83] Hu, L. and Evans, D. (2004) Using Directional Antennas to Prevent Wormhole Attacks. Proceedings of the Network and Distributed System Security Symposium, San Diego, 5-6 February 2004, 131-141.
[84] Schreiber, F.R. (1973) Sybil. Regnery, Chicago.
[85] Qian, L., Song, N. and Li, X. (2005) Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-Path. Proceedings of the IEEE Wireless Communications and Networking Conference, 4, 2106-2111.
[86] Al-Shurman, M., Yoo, S.M. and Park, S. (2004) Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ACM Press, New York, 96-97.
http://dx.doi.org/10.1145/986537.986560
[87] Crepeau, C., Davis, C.R. and Maheswaran, M. (2007) A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes. Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, 21-23 May 2007, 19-26.

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.