Mobile ad-hoc networks are widely used in the tactical battlefield, emergency search and rescue missions. They are also well used in civilian ad-hoc situations like conferences and classrooms due to the ease and speed in setting up such networks. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The wireless adhoc networks are mostly vulnerable to security attacks because of its features of open medium, dynamic topology, lack of centralized management and node mobility.
2. Introduction
Security Goals
Security Attacks
Types of Attacks
o Network Layer attacks
o Transport layer attack
o Application layer attack
o Multi layer attack
Conclusion
References
2
Department of CSE
3. A mobile adhoc network is a dynamic self configuring wireless
network of mobile nodes.
Communication without the fixed infrastructure.
Critical issue is to develop a system to maintain a reliable
routing table
3Department of CSE
5. MANETs are vulnerable to attacks because of following
reasons:
Open Medium
Dynamically changing network topology
Different kinds of attacks have been analyzed in MANETs
and their effects on the network.
5Department of CSE
6. Classification based on the source of attacks:
• Internal attacks
• External attacks
Some attacks are classified depending on the layer of occurrence:
• Network Layer Attack
• Transport Layer Attack
• Application Layer Attack
• Multi Layer Attack
6Department of CSE
7. Black Hole Attack :
• An attacker may create a routing black hole in which all
packets are dropped.
• The attacker could route all packets for some destination
to itself and then discard them.
7Department of CSE
8. Disadvantages of Black Hole Attack :
Decreases throughput
May lead to sleep deprivation attack
Decreases network load
8Department of CSE
9. Worm Hole Attack:
• Two colluding attackers establish a wormhole link.
• One of the attackers captures packets,send them via
wormhole link to second attacker.
9Department of CSE
11. Byzantine Attack:
• A compromised intermediate node works in collision and
carries out attacks.
• Attacks lead to disruption or degradation of the routing
services.
11Department of CSE
12. Session Hijacking:
• The goal is to steal the identity of a victim node and to
achieve session with a target node.
• At first the attacker spoofs the IP address of target
machine and determines the correct sequence number.
• After that attacker performs DOS attack on the victim.
• The attacker now continues the session with the other
system as a legitimate system.
12Department of CSE
13. Repudiation:
Refers to the denial by node involved in a communication
in having participated in communication.
In the network layer, firewalls can be installed to keep
packets in or out. In transport layer, connections can be
encrypted, end-to-end.
But these solutions do not solve non-repudiation problems
13Department of CSE
14. Denial of Service:
▪ Attacker attempts to prevent legitimate users from the
services offered by the network.
▪ A routing table overflow attack and sleep deprivation
are two types of DoS attacks.
14Department of CSE
15. Impersonation or spoofing attack:
▪ Attacker aims to terminate routing operations between
two non-neighbour nodes.
15Department of CSE
16. Sleep deprivation attack:
▪ The idea is to request the services a certain node offers,
over and over again, so it can not go into an idle.
▪ This can be devastating to networks with nodes that have
limited resources.
16Department of CSE
17. Different security threats faced in an mobile ad hoc network
have been analyzed.
The detection and evasion of black hole and worm hole is still
considered as future challenging task.
Disregarding the weaknesses, MANETs have wide range of
applications.
17Department of CSE
18. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki
Nemoto, Nei Kato, Abbas Jamalipour. A Survey of Routing
Attacks in Mobile Ad Hoc Networks, IEEE Wireless
Communication, 14 (5), pp. 85-91,2007
K. Biswas and Md. Liaqat Ali, Security threats in Mobile Ad-
Hoc Network, Master Thesis, Blekinge Institute of
Technology Sweden, 22nd March 2007.
Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad Hoc
Networks, Mobicom 2000
18Department of CSE