The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
A Review Paper on Network Layer attacks in MANETsijsrd.com
The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well-behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
A Review Paper on Network Layer attacks in MANETsijsrd.com
The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well-behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, etc. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this article, we present a survey of the research work on key management in MANETs according to recent literature.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there
should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
ith the recent advancements in and popularity of wireless ne
tworks, the security based issues are also
increasing considerably. In this paper, we look at the data s
ecurity and situational security vulnerabilities
in the communication network for fishermen at sea being develope
d by our research center. We are
proposing certain solutions and algorithms for avoiding some of the si
tuations. They are Adaptive Context-
aware Transmission Power Control (ACTPC) as a proposed solution
for preventing unauthorized users at
the maritime border, along with border alert and distress alert. Th
e algorithms are implemented using a
network of MICAz mote
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, etc. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this article, we present a survey of the research work on key management in MANETs according to recent literature.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The emerging mobile technology has brought revolutionized changes in the computer era. One such technology of networking is Mobile Ad hoc Networks (MANETS), where the mobility and infrastructure less of the nodes takes predominant roles. These features make MANETS more vulnerable to attacks. As the research continues several aspects can be explored in this area. At the very first it can be the problem of how to make the cross layer detection of attacks more efficient and work well. Since every layer in the network deals with different type of attacks, a possible viewpoint to those attack scenarios can be presented so that it can be extended in the later part. It becomes necessary to figure out the security solution architecture if there are different detection results generated by different layers. Secondly, there
should be a measure of the network metrics to show increased performance. The paper presents such a defensive mechanism cross layered architecture which strives to identify and correct misbehaviour in MANETS especially with respect to routing layer. The evaluation of the proposed solution is also given with results obtained to show the performance of the network.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A REVIEW: TRUST, ATTACKS AND SECURITY CHALLENGES IN MANETieijjournal
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional
critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while
allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to
maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
The challenging nature of insecure wireless channels and the open-access environment make the protection of vehicular ad hoc network (VANET) a particularly critical issue. Robust approaches to protect this network's security and privacy against attacks need to be improved, trying to achieve an adequate level, to secure the confidential information of drivers and passengers. Accordingly, to improve the security of VANET, it is necessary to carry out a risk assessment, in order to evaluate the risk this network is facing. This paper focuses on the security threats in VANET, particularly on the availability of this network. We propose a novel risk assessment approach to evaluate the risk of the attack against VANET availability. We adopt a tree structure called attack-tree to model the attacker's potential attack strategies. Based on this attack-tree, we can estimate the probability that a specific menace might lead against VANET and detect potential attack sequences that an attacker could launch against VANET availability. Then, we utilize the utility multi-attribute theory to measure the total risk value of the system, including the probabilities of each sequence of attack. The analysis results of the study will help decision-makers take effective precautions to prevent attack on this network’s availability.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because
they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity
in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network
performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the
number of black hole attacks increases.
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes connecting directly without any fixed communication base station or centralized administration. Nodes in MANET move continuously in random directions and follow an arbitrary manner, which presents numerous challenges to these networks and make them more susceptible to different security threats. Due to this decentralized nature of their overall architecture, combined with the limitation of hardware resources, those infrastructure-less networks are more susceptible to different security attacks such as black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall security level of Mobile ad hoc networks.
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Mobile Ad-hoc Network (MANET) is a distributed, decentralized network of wireless portable nodes
connecting directly without any fixed communication base station or centralized administration. Nodes in
MANET move continuously in random directions and follow an arbitrary manner, which presents
numerous challenges to these networks and make them more susceptible to different security threats. Due
to this decentralized nature of their overall architecture, combined with the limitation of hardware
resources, those infrastructure-less networks are more susceptible to different security attacks such as
black hole attack, network partition, node selfishness, and Denial of Service (DoS) attacks. This work aims
to present, investigate, and design an intrusion detection predictive technique for Mobile Ad hoc networks
using deep learning artificial neural networks (ANNs). A simulation-based evaluation and a deep ANNs
modelling for detecting and isolating a Denial of Service (DoS) attack are presented to improve the overall
security level of Mobile ad hoc networks.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
Mobile Ad hoc Networks (MANET) is one of the rapidly emanating technologies, which has gained attention in a wide range of applications in the fields of military, private sectors, commercials and natural calamities. Securing MANET is a dominant responsibility, and hence, a trust factor and fuzzy based intrusion detection and prevention system is proposed for routing in this paper. Based on the trust values of the nodes, the fuzzy system identifies the intruder, such that the path generated in the MANET is secured. Moreover, an optimization algorithm, entitled Fuzzy integrated Particle Swarm Optimization (FuzzyFPSO), is proposed by the concatenation of the Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) for the optimal path selection in order to provide secure routing. The simulation of the proposed methodology is NS2 simulator and analysis is carried out considering four cases, like without attack, flooding attacks, black hole attack and selective packet drop attack concerning throughput, delay and detection rate. The remarkable evaluation measures of the proposed Fuzzy-FPSO are the maximal throughput of 0.634, minimal delay of 0.044 , maximal detection rate of 0.697 and minimal routing overhead of 0.24550 And the evaluation measure for the case without any attacks are the maximal throughput of 0.762, minimal delay of 0.029 ,maximal detection rate of 0.805 and minimal routing overhead of 0.11511.
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKScscpconf
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly based on its own characteristics and behaviour. In addition, defeating approaches against attacks have been evaluated in some important metrics. After analyses and evaluations, future scopes of work have been presented.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
Secured Intrusion Protection System through EAACK in MANETSijtsrd
Achieving reliable routing has always been a major issue in the design of communication networks, due to the absence of fixed infrastructure among which mobile ad hoc networks MANETs that can take control of the most adversarial networking environment, and the dynamic network topology the nature of open transmission media. In the MANETs these characteristics also more challenging to make the design of routing protocols. The network topology varies so to determining feasible routing paths for distributing messages in a decentralized is a difficult job. Factors such as the extensive distribution of nodes and open medium, variable wireless link quality topological changes, and propagation path loss become pertinent issues and make MANET unprotected to instructions. Thus, it becomes central to develop a systematic intrusion detection scheme to secure Mobile Ad Hoc networks from intruders. In this project, we put forward and applied an efficient IDS mechanism based on Enhanced Adaptive Acknowledgment EAACK especially made for MANETs which performs better than the earlier techniques such as AACK, TWOACK and Watchdog. Mr. Ravishankar Kandasamy | M. Ajith Kumar | M. Ajith Kumar | G. Arun Kumar "Secured Intrusion Protection System through EAACK in MANETS" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30457.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30457/secured-intrusion-protection-system-through-eaack-in-manets/mr-ravishankar-kandasamy
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct features like dynamic topology, hop-by-hop communications and easy and quick setup, MANETs encountered lots of challenges allegorically routing, security and clustering. The security challenges arise due to MANET’s self configuration and self maintenance capabilities. In this paper, we present an elaborate view of issues in MANET security. Based on MANET’s special characteristics, we define three security parameters for MANET. In addition we divided MANET security into two different aspects and discussed each one in detail. A comprehensive analysis in security aspects of MANET and routing approaches is presented. In addition, defeating approaches against attacks have been evaluated in some essential metrics. After analyses and evaluations, future scope of work has been presented
Similar to Security challengesasa factor affectingthe (20)
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
DOI : 10.5121/ijnsa.2015.7301 1
SECURITY CHALLENGESASA FACTOR AFFECTINGTHE
SECURITY OFMANET: ATTACKS, AND SECURITY
SOLUTIONS
Dr.Nabeel Zanoon1
, Dr.Nashat Albdour2
, Dr.Hatem S. A. Hamatta1
, and
RashaMoh'd Al-Tarawneh1
1
Department of Applied Science, Aqaba University College/Al-Balqa Applied
University, Aqaba, Jordan
2
The Department of Electrical & Computer Engineering, Tafila Technical
University, Tafila Technical Universities, Aqaba, Jordan
ABSTRACT
The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute
challenges and weaknesses before the security progress in MANET network. It causes weakness in security,
which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten
MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between
them will be concluded and architectural security solutions in MANET will beproposed.
KEY WORDS
MANET, Ad Hoc, Challenges, Attacks, Security Solutions, wireless.
1.INTRODUCTION
Nodes are linked to each other by a wireless medium where each node makes an end guided to all
nodes connected to a network. [1] MANET is the network which consists of a collection of
devices or nodes connected with one another without the help of any central administrator. It can
form a dynamic network for the exchange of data without the use of any others network with
fixed dynamic infrastructure. Any node can be connected to the networkbywireless medium
dynamically, but at the same time it represents the role of the node and routers. The Topology
MANET is renewed, because the nodes change and enter in the network and leave network
continuously. However, MANET provides advanced, renewed and constant technology, but it
faces challenges that threaten its security [2]
The concept of security for (MANET) means protocols security to which you subscribe and deal
with it in order to protect it from threats. In order for MANET to do its core business, which is the
exchange of data between the related and connected nodes, [3] there are those who threaten and
attack the security of MANET from outside and also from inside. The attacks are in two levels;
2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
2
the first level is the attack on the basic mechanisms such as guidance, while the second level of
the attacks threatens the security that protects the MANET network. [4]
MANET has two dimensions in protection: the first dimension is protection of guidance
operations through communication between the nodes; and the second dimension is the protection
of the data to be exchanged. The security solutions to protect MANET are in the level before the
attacks so as to form a defense line that provides protection. [5] But MANET characteristics pose
challenges to the development of security solutions, because of a variety of attacks exploiting
vulnerabilities in MANET caused by challenges. [6]
Wireless MANET is considered more vulnerable to attacks compared with wired networks
because there are several challenges that will be studied in this paper. The security in MANET is
an important issue, because in MANET communication is in groups.Also senders and receivers
are multiple in a complex way compared with the case of a unicast. Most solutions for unicasts
are ineffective with the multicast [7] in providing a secure connection in such a changing
environment as well as protection against specific threats and attacks. There must be a different
architectural and security plans. [8] In this paper we will highlight the security architecture design
and feature analysis, as well as factors of insecurity, security threats and the relationship between
them in MANET. Security challenges are considered obstacles, for they are threatening the
security of MANET network, and there are several challenges facing the security of MANET.
2.CHALLENGES IN MANET NETWORK
The challenges facing the (mobile ad hoc) networks are a concern for the design and
communication processes in the network. Some MANET network characteristics pose challenges
in front of security solutions in MANET network [9].
2.1.Infrastructure And Routing
The nature of the network is one of the problems that stand in front of MANET network security.
The nature of MANET network is open and its topology is mobile not fixed. Direction is
considered an important issue for security because the nodes work as a guide. Guides are free to
move randomly and organize themselves without any bases [10] The basis of the work of (Ad
hoc) network is independent of any infrastructure, and this leads to any viable classic list of the
application on the certification and on servers line. This leads to no classical applicable solutions
based on certification and the line servers which have no such clear and secure borders in the
cellular network, if compared with other networks such as wired network [11]. We conclude that
the network topology affects the performance of the network. The nodes in the network are
constantly moving, changing the nodes from time to time and this makes it difficult to predict the
patterns of distribution and dealing with route decisions.
2.2.Mediums of wireless communication
By nature the MANET network is a wireless network. Signals are transmitted between network
nodes through a joint medium. The wireless medium is considered extensive and unrestricted with
any limits of any open centre. It is apt to the influence of external signals. Accordingly, it is
3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
3
regarded less reliable from wired means of communication [12]. The medium in wireless
MANET is multi-hops, for it is affected by the overlap between neighbouring devices [13]. In
other words, the wireless joint medium makes MANET more vulnerable to attacks than others.
This is causing a number of attacks that affect MANET.
2.3.Energy consumption
The cellular phones that subscribe in (MANET) network rely on energy sources such as batteries,
which is a problem in wireless networks. A device in (MANET) works as a director which
constantly communicates with other devices, and this energy plays an important role [14].
2.4.Scalability
The MANET network is expandable and scalable in terms of the number of nodes and topology.
The potentiality of development means the network's ability to provide service to the nodes
connected to a network, taking into consideration the size of the network and the increasing
number of nodes from time to time [15]. The size of the network and the number of nodes
connected to the network plays an important role in control mechanism. It is a challenge for the
network security. Therefore, a security mechanism is able to protect the network must be
provided, regardless of the size and number of nodes in the network [16].
2.5.Bandwidth
Bandwidth in MANET network is regarded a difficult problem, because it is shared between the
neighbouring hosts, while individual host has no knowledge about the other traffic of the
neighbouring hosts [17]. In MANET network the routing tables of nodes are updated repeatedly
and continuously, and this leads to the consumption of a large amount of bandwidth, which
represents an obstacle for the network as it leads to a decline in the ability of the network to send
and receive data. [18]
2.6.Software and applications in devices
Developed devices in MANET are used to access e-mail, various applications and data, games,
etc. However companies are struggling between satisfying the needs of the subscribers and
influencing the security situation [19]. Programs on the machine may be out of date, which is
regarded as a sign of weakness which may be exploited by attackers [20].The Social networking
programs contain user information and are used to communicate with others without restrictions
and control.
3.SECURITY THREATS AND ATTACKS IN MANET NETWORK
There are several types of attacks which threaten the security MANET network. There are two
types of attacks that threaten the security MANET network, negative and effective. The negative
attacks are based on eavesdropping and spying on data traffic in the network and acquire
important confidential information, while effective attacks affect the guidance protocols through
malicious nodes as fake nodes based on misleading the data traffic by fabricating false guiding
4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
4
information [21]. The MANET network is a global network that provides essential services to
users. Therefore it should provide confidentiality, safety and protection of the information from
any attack. The attacks and their impact on MANET Security Network will be discussed as
follows:
3.1.Types of attacks
Attacks are divided according to the attacker's site into two types; an external attack where the
attacker is not from the network but is located outside the network. As for internal attack, the
attacker enters as a node in the network and participates in the activities of the network as well,
but it plays the role of a cheater by sending some phantom packages that mislead the course of the
traffic in the network [22]. In the MANET network there are negative and effective attacks.
Negative attacks in the MANET network use spying mechanism on information by stealing
confidential data and tracking transmitter packs. Nevertheless, they do not implement any action
which affects traffic and guidance. They are unknown and difficult to detect and recognize, and
unlike effective attacks they can be detected and identified easily. They are based on the change
in the track and affect the data traffic through the confusion on the network, and are located in
different layers of the online model as shown in table (1) [23].
5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
5
Table 1. The impact of the attacks on the MANET by layers: model OSI. [27] [26] [25] [24]
EffectsAttacks
Layers
It spies on data packets, steals important information, and puts itself between the
parties to contact.
Eavesdropping
Physical
It sends fake signals and interferes with effective communication. It affects the
performance of the network by reducing the capacity of the package and delaying
the delivery of packets, and the packets may reach damaged.
jamming attack
It is based on the track and analysis of the flow of traffic so as to know the
network scheme, leading to detect nodes and have access to them.
Traffic Analysis
DataLink
It is based on disabling the work of guidance protocols, and occupies a place
between nodes.
Malicious behavior
of nodes
It is based on access to confidential data without being able to change or amend
them.Monitoring
It occurs during the implementation of the packet guiding process. It uses a
guidance protocol so as to identify itself as the course of authentication to the
target node. It creates a reply message to so that it takes the shortest path to the
goal. It uses a fake way to reach the goal.
Black hole attack
Network
It sends a request to the nodes that will be attacked, and the nodes reply to the real
demand, and then the fake demand is approved, and thus the attacker comes into
contact.
Rushing Attack
It is based on misleading the data traffic path and exploits it for its benefit in
changing or destroying the confidential information.
Sinkhole attack
It is based on dropping messages to mislead the path to the destination, and here is
an ambush of where to drop the package.
Gray Hole Attack
It is based on a repeat of the attack on data packets so as to inject the traffic that
has been captured in the past, leading to mislead the guiding path in the MANET
network.
replay attack
Is is based on the discovery of the path or re-directing unnecessary ones repeatedly
and continuously.
resource
consumption
It is represented in the cooperation between two attacking nodes. The first attacker
picks a package and to the other attacker by using a high-speed medium.
wormhole
It consists of a set of nodes and is collectively sets up guide rings, and it also
guides packets in worst tracks
Byzantine attack
It misleads the track and drops packets, which can be regarded as a declaration of
itself as the right track so as to drop packets.
GRAY HOLE attack
It comes in the middle of the contact by sending SYN to the target node and
exploits a response from the ACK target node.SYN flooding attack
Transport
It is based on the exploitation the address of the IP target by identifying the correct
serial number. It works to stop service from the target node as if they were non-
existent in the network.
Session hijacking
It eavesdrops and then rejects or denies knots a participation node in contact after
it had contributed in part or whole contact.
Repudiation attack
Application
It attacks operating system and applications which reside as viruses, worms and
spyware, and Trojan horse.Malicious code
attacks
6. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
6
4.SECURITY REQUIREMENTS FOR MANET
The task of providing security in the MANET network is a key matter in order to protect the
services that are exchanged between the nodes. It is necessary to find security solutions for
MANET network where security services such as confidentiality and integrity, non-repudiation,
authentication, authorization and anonymity, are available. These security services are a
fundamental requirement in security solutions in MANET network [28]:
• Confidentiality: to maintain the confidentiality of any information or data, and never
be disclosing it to unauthorized parties, because the unauthorized parties threaten
MANET network security.
• Integrity: protection of message data during transmission, that is, the data are not to
be changed during transmission.
• Availability: it is based on maintaining the survival of network services while
working on the denial of service attacks.
• Non-repudiation: it ensures that the sender of the message cannot deny sending a
message that after sending it, that is, to guarantee showing the identity of sender.
• Authentication: to ensure the identity of the nodes connected to the network, that is,
authentication when connecting to the network.
• Authorization: it is a mechanism for defining the powers to gain access to certain
resources, that is, control over how to access the network.
• Anonymity: keeping personal information on a node, and not distributed by the node
itself or the system software, that is, contact is unknown [29].
5.SECURITY SOLUTIONS FOR (MANET) NETWORK
The MANET network provides communication between different nodes; these nodes do the
functions of the basic network, including sending, receiving, and forwarding packets. Nodes may
be exposed to attack during the communication and performing the functions of the network. The
network must be protected, and to ensure the security of the network a security mechanism has to
be put to counter attacks that threaten the security of the network. In MANET network there are
two types of security mechanisms that help protect MANET network of the attackers, including
the preventive mechanism and reaction mechanism. The preventive mechanism works as the first
line of defence in the protection process through the use of certain techniques that help to protect
the network from the dangers. These methods include authentication, access control, encryption
and digital signatures. The reaction mechanism represents the second line of defence and it uses
schemes such as intrusion detection system (IDS) to detect misuse and anomalies [30]. Having
studied the attacks that threaten MANET network and known the security requirements, we
conclude that complete security solution requires the presence of both prevention and detection
mechanisms and reaction in MANET.
5.1.Characteristics of security solutions
The security solutions are based on network protection and raising the level of security in the
MANET network. As a corollary, there has to be some properties available in the proposed
network security solutions in MANET including:
7. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
7
• The security solution must be applied through the individual components for
collective protection of each network.
• The security solution must include all layers, as these layers work complementarily.
• The security solution must provide the ability to avoid threats from both internal and
external parties.
• The security solution must apply all security mechanism including prevention,
detection, and interaction [31].
5.2.Architectural security solutions for MANET.
In this paper security in MANET has been studies by investigating the challenges, attacks and
security requirements. Accordingly, an architectural design shows each component and its role in
reaching a security solution to a problem of defining the security of MANET. MANET network,
like other networking systems, requires several things that must be taken into account when
designing MANET network or when proposing a security solution. Any security solution must
include security mechanism.
From figure 1, it is noticed that any connection between two nodes is made in a coherent
communication is done through another node. During contact some challenges are encountered
which is a sign of weakness in the level of protection, and this helps to give opportunities for
attackers of MANET whether from the outside or from the inside. Solutions must be found to
protect MANET network based on the security requirements and security mechanism in order to
reduce and avoid the challenges, and this leads to reduce and avoid attacks. Hence we strengthen
and raise the level of protection by a strong security wall against attacks. In this architecture each
component affects the other components.
Figure 1. Architectural Security Solutions in MANET
5.3.The proposed security solutions
The security mechanism in MANET requires security solutions so as to build a security wall to
protect MANET against risks and attacks that may be exposed to it. The attacks occur when
security is weak which results in the challenges which stand in the development of security
Attacks
Security Challenges
Node
A
Node
B
Node
C
Source Node S Destination NodeD
Security
Security
Requirements
• Authentication
• Availability
• Confidentiality
Security solution
Security against
8. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
8
solutions. The challenges must be investigated and avoided in order to provide a safe environment
devoid of threats and attacks. In this study some of the security solutions are suggested in table 2.
Table2. The Security Solutions against the Attacks on MANET
Challenge Attacks Solutions
• Infrastructuraland
Routing
• The Wireless Media
• Power Consumption
• Scalability
• Bandwidth
• application on devices
Eavesdropping
jamming
Works by way of spread spectrum
Traffic Analysis
Malicious behavior of
Nodes
Monitoring
Works to correct the error in the
debug code
Black Hole
Sinkhole
Gray Hole
WormHole
GRAY HOLE
Black Hole
Rushing
Replay
Resource
Consumption
Byzantine
Works on authentication mechanism
of sources and integrity and secure
guiding protocols
SYN flooding
Session hijacking
Works on the authentication
mechanism and ensuring contact
between the two parties by using
(SSL, TLS, PCT) encryptions
Repudiation
Malicious code
Work on the detection and prevention
of the virus through the use of
firewalls, IDS
6.LEVELS OF SECURITY IN MANET NETWORK
Contact between any two parties in MANET consists of a node which may be a cellular and a
wireless transport medium and routing protocols and packet data, while challenges include all the
components of MANET, as the attacks threaten the security of all MANET components. MANET
network is made up of communication between several mobile devices, which constitute points of
connection. The exchange of packets takes place through the wireless medium network. MANET
is different from the other networks in that it contains no cellular base stations or access points,
which represent the central administration.
6.1.Node level: The nodes represent a point of contact in MANET. They are distinguished by
certain characteristics each of which represents a challenge to the security mechanism in
MANET:
9. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
9
• Nodes in MANET are connected together via a wireless medium.
• The nodes work as a host device and router at the same time.
• Nodes in MANET share the same medium.
• Nodes in MANET use multiple-hop communications.
• Nodes in MANET move freely and automatically.
• Nodes in MANET have a limited capacity in terms of power, memory, etc.
6.2.The level of transport medium: It represents the line through which data pass between the
contact points in MANET. The medium of the transport is characterized by characteristics that
represent a challenge to the security mechanism in MANET:
• The medium of transfer is common in MANET.
• All points in MANET medium may transmit at any time.
• The medium of transfer is protected from any external signal.
• The medium of transfer has different time periods and asymmetric characteristics of
spread.
6.3.The level of data packets: The data move between the contact points in MANET in the form
of packets of data. The packets are characterized by qualities of challenging the security
mechanism in MANET:
• The packets contain a group of information on the source node, the destination node
and on routing packets.
• The routing tables in each node are stored for the routing process.
• The packets size increases with continuous change of the size of the network.
6.4.The level routing protocols: The path and nodes in MANET are determined by routing
protocols. The protocols are characterized by qualities which represent each challenge in front of
security mechanism in MANET
• Routing protocols are divided into two parts; the first are proactive protocols which
are characterized by proactive examination of links to modify routing tables and
emotional reaction when a problem is detected.
• Routing protocols are based on updating information in guidance table either
periodically or upon request.
• Routing protocols use algorithms in determining the best path for routing packets.
7.RELATIONSHIP BETWEEN CHALLENGES, ATTACKS AND SECURITY IN
MANET
It has been shown in the architectural security solutions for MANET that the security mechanism
in MANET is integrated. Each component depends on the other component, and therefore we
conclude that the relations between the security components in MANET, as shown in Figure (2)
show that the security requirements are just a starting point when we want to put security
solutions. The relationship is as follows: when the level of security is low, it is attributed to the
10. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
10
Not Secure Most SecureSecurity
Requirements
Challenges
Attacks
Challenge
s
Attacks
Security
Security
challenges facing the development of security solutions, leading to the increase in attacks. On the
other hand, when challenges are few, there are fewer attacks on the MANET. This is an indicator
of raising the level of security in MANET. The relationship shows that the challenges are an
obstacle to the development of some security solutions for MANET network.
Figure 1.Relationship between challenges, attacks and security in MANET
Security mechanism in any network system is affected by attacks that penetrate the wall of
network security through challenges, which is a gap in the security. MANET is affected by the
attacks through the challenges of security. Table 3 shows the relevance of the effect of each of the
challenges and attacks on MANET components.
Table 3.The Link between the Components, Challenges and Attacks in MANET
Attacks
Components In
Security
Challenges
Resource consumption
Node: Mobile
Devices
Power Consumption,
Software and application,
Infrastructural
Sinkhole, Gray hole, Wormhole,
Flooding, Replication
Data: packets
Bandwidth, Scalability,
Infrastructural, Wireless
Media, Cooperativeness
Byzantine, Gray hole, Black hole,
Wormhole, Sinkhole, Resource
consumption, Routing, Flooding, SYN
flooding
Route: routing
Protocol
Scalability, Infrastructural,
Wireless Media,
Cooperativeness, Power
Consumption
SYN flooding, Eavesdropping
Jamming, Active Interference
Media: wireless
Bandwidth, Wireless Media.
Power Consumption
11. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
11
8.CONCLUSION
In any communications system, there are some challenges, and these challenges are considered an
indicator of the security gaps which generate weakness in the system protection and are
vulnerable to attacks. The MANET network, like other networks, faces some of the challenges
that have been studied in this paper. They form a gap in the firewall to MANET. However,
security solutions must be found to help get rid of or minimize the challenges to protect MANET
and raise level of security in it. Several solutions have been put forward commensurate with the
challenges. MANET network is expanding dynamically and evolving continuously and rapidly.
With the passage of time challenges are renewed and security solutions are renewed
commensurate with the developments.
REFERENCES
[1] SaloniVashisht, AnkitVashisht&Sheveta, (2014), “An Empirical Performance Evaluation of AODV
and DSR using ALERT Protocol in MANET”, International Journal of Computer Applications, Vol
97.
[2] Saleh Ali K.Al-Omari , Putra Sumari, (2010), “An Overview of Mobile Ad Hoc Networks for the
Existing Protocols and Applications”, International journal on applications of graph theory in wireless
ad hoc networks and sensor networks,Vol2 .No 1 pp 87-110.
[3] RashmiMahajan, S. M. Patil, (2014), “A Review of MANETs Security Aspect and Challenges with
Comprehensive Study of SIDS for Discovering Malicious Nodes”, International Journal of Innovative
Science Engineering and Technology (IJISET), Vol. 1 Issue 6, pp241-250.
[4] T. Navaneethan, M. Lalli, (2014), “Security Attacks in Mobile Ad-hoc Networks A Literature
Survey”, international Journal of Computer Science and Mobile Applications, Vol.2 Issue. 4, pp 1-7
[5] V.Umadevi, S.Geetha&G.Geetharamani, (2014),” Survey on Secure Routing Protocols in MANET”,
International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3,
Issue 7, pp 7609-7611.
[6] CH.V. Raghavendran , G. Naga Satish& P. Suresh Varma,(2013) ,” Security Challenges and Attacks
in Mobile Ad Hoc Networks”, Information Engineering and Electronic Business, vol.5, no.3,pp 49-58
[7] RashmiC.Deshmukh,BhushanN.Mahajan ,(2012),“Smart Key Management Using Incremental
Grouping key Management Algorithm”, International Journal of Engineering Research and
Applications (IJERA) , Vol. 2, Issue 3, pp.2607-2611.
[8] Sneha U. Agalawe ,NitinR.Chopde, ( 2014) “Security Issues: The Big Challenge In Manet”,
International Journal of Computer Science and Mobile Computing ,Vol.3 ,Issue.3, pp. 30-34
[9] Yogendra Jain, Geetika S. Pandey&DeshrajAhirwar, (2012),” An Improved Routing Mechanism for
Secure Ad-hoc Network”, International Journal of Engineering and Advanced Technology (IJEAT),
Vol-1, pp 37-44.
[10] Anna Vijendran ,J.VijiGripsy, (2014) ,”A Meticulous Investigation Of Impersonation Attacks on
Manets Using Different Routing Protocols”, International Journal of Computer Engineering and
Applications, Volume V, Issue I, pp 106-113.
[11] RavikiranPandurangPawar, (2013), “Secure Intrusion Detection System against DDOS Attack In
MANET “, International Journal of Engineering Research & Technology (IJERT), Vol- 2.
[12] Ashish M. Mishra, Charan Singh,(2014),Worm-Hole Detection Mechanism for Reactive Routing of
Mobile Ad-Hoc Network, International Journal of Emerging Research in Management &Technology,
Vol-3.
[13] Marwaha, S Indulska, J. &Portmann, M, (2008) ,“Challenges and Recent Advances in QoS
Provisioning, Signaling, Routing and MAC protocols for MANETs”, IEEE Telecommunication
Networks and Applications Conference, pp 97 – 102.
12. International Journal of Network Security & Its Applications
[14] S. Ahmed, A. K. Ramani, (2007) , “Exploring the Requirements for QoS in
Networks” Journal of Information & Communication Technology, Vol. 1, No. 2, pp 1
[15] SharmilaSankar, V. Sankaranarayanan, (2010), “A Low Overhead Reachability Guaranteed Dynamic
Route Discovery Mechanism for Dense MANETs”, International J
Ubiquitous Computing (IJASUC) ,Vol.1, No.3,pp 72
[16] Ashwani Kumar,(2012), “Security Attacks in Manet
Application,
[17] DharamVir, S.K, Agarwal&S.A.Imam, (2013),”Performance
Bandwidth Estimation”, International Journal of Scientific and Research Publications, Volume 3.
[18] Marwaha, S Indulska, J. &Portmann, M,(2008),”Challenges and Recent Advances in QoS
Provisioning, Signaling, Routing and MAC prot
and Applications Conference..
[19] http://www.pcworld.com/article/2010278/10
[20] Ankur O. Bang, Prabhakar L. Ramteke, (2009),”MANET: History, Challenges and Appl
International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume
2.
[21] Anuj K. Gupta, (2009),”Secure Routing Techniques for Mobile Ad Hoc Networks”, IEEE
International Advance Computing Conference.
[22] KhushbooSawant, M.K Rawat,(2014),”Survey of DOS Flooding Attacks over MANET
Environment”, Journal of Engineering Research and Applications, Vol. 4, pp.110
[23] TusharSaxena, (2013),”Analytical Study of Attacks on Manets Based on Layered Architecture”,
Cyber Times International Journal of Technology & Management, vol
[24] http://www.bth.se/fou/cuppsats.nsf/all/3878ec739b12f80ac12572c2003f7d58/$file/Final_Thesis.pdf
[25] Al-Sakib Khan Pathan, (2010),”Security of Self
VANET”, 1st, pp211.
[26] Amit M Holkar, NehaShindeHolkar&DhiirajNitnawwre, (2014), “Investigation of Application Attack
on MANET”, International Journal of Computer Applications, Volume 85.
[27] Athira V, Panicker, Jisha G, (2014),”Network Layer Attacks and P
International Journal of Computer Science and Information Technologies, Vol. 5, NO 3.
[28] Manu Srivastava, Saurabh Mishra &Upendra Kumar Soni , Shah Fahad,(2014),” Secured 7 Layer
Security Architecture (S7LSA) For Mobile AdHoc
Applications, Vol. 4, Issue 4, pp.01
[29] Jianminchen, jiewu, (2011),”Wireless Technologies: Concepts, Methodologies, Tools and
Applications”, Chapter 4.1, P864.
[30] KamanshisBiswas , Md. Liakat Ali,(2007
Thesis, Blekinge Institute of Technology.
[31] Muhammad Arshad Ali, YasirSarwar, (2011),”Security Issues regarding MANET (Mobile Ad Hoc
Networks: Challenges and Solutions”, Master Thesis Computer Scienc
Technology
Author
Dr. Nabeel Mohammed Zanoon, He received his PhD in Computer Systems Engineering,
from South-West State University, Kursk, Russia, in 2011. He is
Balqa’ Applied University since 2011; where he is currently Assistant professor and Head
of the Department of Applied Sciences as well as Director of the ICDL Computer Centre
and Cisco Academy Branch of Aqaba University College. He has published several researc
areas, Security of E-Banking, Algorithm Scheduling in Grid
Architectural computer, Fiber optical ,
NashatGhalebAlbdour received his B.Sc. and
Networks from Kirovograd National Technical University, Kirovograd, Ukraine Faculty of Computer ,
International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
S. Ahmed, A. K. Ramani, (2007) , “Exploring the Requirements for QoS in Mobile Ad Hoc
Networks” Journal of Information & Communication Technology, Vol. 1, No. 2, pp 1-9.
SharmilaSankar, V. Sankaranarayanan, (2010), “A Low Overhead Reachability Guaranteed Dynamic
Route Discovery Mechanism for Dense MANETs”, International Journal of Ad hoc, Sensor &
Ubiquitous Computing (IJASUC) ,Vol.1, No.3,pp 72-83.
Ashwani Kumar,(2012), “Security Attacks in Manet - A Review”, International Journal of Computer
DharamVir, S.K, Agarwal&S.A.Imam, (2013),”Performance Analysis of MANET with Low
Bandwidth Estimation”, International Journal of Scientific and Research Publications, Volume 3.
Marwaha, S Indulska, J. &Portmann, M,(2008),”Challenges and Recent Advances in QoS
Provisioning, Signaling, Routing and MAC protocols for MANETs”, Telecommunication Networks
and Applications Conference..
http://www.pcworld.com/article/2010278/10-common-mobile-security-problems-to-attack.html
Ankur O. Bang, Prabhakar L. Ramteke, (2009),”MANET: History, Challenges and Appl
International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume
Anuj K. Gupta, (2009),”Secure Routing Techniques for Mobile Ad Hoc Networks”, IEEE
International Advance Computing Conference.
awant, M.K Rawat,(2014),”Survey of DOS Flooding Attacks over MANET
Environment”, Journal of Engineering Research and Applications, Vol. 4, pp.110-115.
TusharSaxena, (2013),”Analytical Study of Attacks on Manets Based on Layered Architecture”,
mes International Journal of Technology & Management, vol-6.
http://www.bth.se/fou/cuppsats.nsf/all/3878ec739b12f80ac12572c2003f7d58/$file/Final_Thesis.pdf
Sakib Khan Pathan, (2010),”Security of Self-Organizing Networks: MANET, WSN, WMN,
Amit M Holkar, NehaShindeHolkar&DhiirajNitnawwre, (2014), “Investigation of Application Attack
on MANET”, International Journal of Computer Applications, Volume 85.
[27] Athira V, Panicker, Jisha G, (2014),”Network Layer Attacks and Protection in MANETA Survey”,
International Journal of Computer Science and Information Technologies, Vol. 5, NO 3.
Manu Srivastava, Saurabh Mishra &Upendra Kumar Soni , Shah Fahad,(2014),” Secured 7 Layer
Security Architecture (S7LSA) For Mobile AdHoc Network”, Journal of Engineering Research and
Applications, Vol. 4, Issue 4, pp.01-04.
Jianminchen, jiewu, (2011),”Wireless Technologies: Concepts, Methodologies, Tools and
Applications”, Chapter 4.1, P864.
KamanshisBiswas , Md. Liakat Ali,(2007) ,“Security Threats in Mobile Ad Hoc Network, Master
Thesis, Blekinge Institute of Technology.
Muhammad Arshad Ali, YasirSarwar, (2011),”Security Issues regarding MANET (Mobile Ad Hoc
Networks: Challenges and Solutions”, Master Thesis Computer Science, Blekinge Institute of
He received his PhD in Computer Systems Engineering,
West State University, Kursk, Russia, in 2011. He is faculty member with Al-
’ Applied University since 2011; where he is currently Assistant professor and Head
of the Department of Applied Sciences as well as Director of the ICDL Computer Centre
and Cisco Academy Branch of Aqaba University College. He has published several researc
Algorithm Scheduling in Grid and Cloud, Meta-Grammar,
, Fiber optical ,Mobile Ad Hoc Networks.
received his B.Sc. and M.Sc degree in Computers, Complexes, Systems and
Networks from Kirovograd National Technical University, Kirovograd, Ukraine Faculty of Computer ,
(IJNSA) Vol.7, No.3, May 2015
12
Mobile Ad Hoc
9.
SharmilaSankar, V. Sankaranarayanan, (2010), “A Low Overhead Reachability Guaranteed Dynamic
ournal of Ad hoc, Sensor &
A Review”, International Journal of Computer
Analysis of MANET with Low
Bandwidth Estimation”, International Journal of Scientific and Research Publications, Volume 3.
Marwaha, S Indulska, J. &Portmann, M,(2008),”Challenges and Recent Advances in QoS
ocols for MANETs”, Telecommunication Networks
attack.html
Ankur O. Bang, Prabhakar L. Ramteke, (2009),”MANET: History, Challenges and Applications”,
International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume
Anuj K. Gupta, (2009),”Secure Routing Techniques for Mobile Ad Hoc Networks”, IEEE
awant, M.K Rawat,(2014),”Survey of DOS Flooding Attacks over MANET
TusharSaxena, (2013),”Analytical Study of Attacks on Manets Based on Layered Architecture”,
http://www.bth.se/fou/cuppsats.nsf/all/3878ec739b12f80ac12572c2003f7d58/$file/Final_Thesis.pdf
Organizing Networks: MANET, WSN, WMN,
Amit M Holkar, NehaShindeHolkar&DhiirajNitnawwre, (2014), “Investigation of Application Attack
rotection in MANETA Survey”,
International Journal of Computer Science and Information Technologies, Vol. 5, NO 3.
Manu Srivastava, Saurabh Mishra &Upendra Kumar Soni , Shah Fahad,(2014),” Secured 7 Layer
Network”, Journal of Engineering Research and
Jianminchen, jiewu, (2011),”Wireless Technologies: Concepts, Methodologies, Tools and
) ,“Security Threats in Mobile Ad Hoc Network, Master
Muhammad Arshad Ali, YasirSarwar, (2011),”Security Issues regarding MANET (Mobile Ad Hoc
e, Blekinge Institute of
He received his PhD in Computer Systems Engineering,
’ Applied University since 2011; where he is currently Assistant professor and Head
of the Department of Applied Sciences as well as Director of the ICDL Computer Centre
and Cisco Academy Branch of Aqaba University College. He has published several research in several
, hardware and
M.Sc degree in Computers, Complexes, Systems and
Networks from Kirovograd National Technical University, Kirovograd, Ukraine Faculty of Computer ,
13. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.3, May 2015
13
the PhD Degree in telecommunication systems and networks from National Technical University of
Ukraine, L`viv, Ukraine in 2011, He is faculty member with Department of Electrical & Computer
Engineering,
Dr. Hatem S. A. Hamattareceived his B.Sc. degree in Computer Science from Yarmouk
University, Irbid, Jordan, in 2003, the M.Sc. degree in Computer Science from University
of Jordan, Amman, Jordan, in 2006, the PhD Degree in Wireless Network Security from
Aligarh Muslim University, Aligarh, India, in 2014. Since 2006, he has been with the
faculty of the Department of Applied Sciences at Al-Balqa` Applied University/Aqaba
University College, Aqaba, Jordan; where he is currently Assistant Professor and Dean Assistant for
Development and Quality Assurance. His research interests include Wireless Network Security, Mobile Ad
Hoc Networks, Intrusion Detection Systems and Security Design Issues. He is also a member of the IEEE
GOLD Affinity Group, Professional Communication and Computer Society. Also, he is a member of ACM
and International Association of Engineers.
NashatGhalebAlbdour received his B.Sc. and M.Sc degree in Computers, Complexes, Systems and
Networks from Kirovograd National Technical University, Kirovograd, Ukraine Faculty of Computer ,
the PhD Degree in telecommunication systems and networks from National Technical University of
Ukraine, L`viv, Ukraine in 2011, He is faculty member with Department of Electrical & Computer
Engineering,
Rasha M. Al-Tarawneh received her B.Sc. and M.Sc. degree in Computer Science from
Al-Balqa` Applied University, Salt, Jordan, in 2008 and 2011 respectively. Since 2011,
she has been with the faculty of the Department of Applied Sciences at Al-Balqa`
Applied University/Aqaba University College, Aqaba, Jordan; where she is currently a
full time Lecturer.