You are on page 1of 3

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org


Volume 6, Issue 5, September- October 2017 ISSN 2278-6856

A Review on Security Techniques in MANET


JayashreeAgarkhed
Professor, Department of C.S.E, P.D.A College of Engineering,
Kalaburagi, India.

II. RELATED WORK


Abstract The Mobile ad hoc network (MANET)is more The main intend of ad hoc network is to provide efficient
prone to various attacks due to its network characteristics such and robust operation in the network using routing protocols
as unreliable of links, lack of centralized administration and [2]. A number of the design challenges and characteristics
mobile nodes in the network. The defense in the network has to of MANETs include
be increased tremendously to face the bad attacks. In order to 1. Wireless link: The wireless link availability is not
achieve security in MANET, availability, integrity, non- reachable to everyone.
repudiation and authentication must be satisfied by the
2. Secure boundaries: Lack of secure boundaries
network. Providing authentication is the key issue in MANET
during detection of correct route in infrastructure less network. welcomes various threats and attacks within the
This paper reviews various security attacks network.
Keywords Security, Ad hoc network, Routing, MANET 3. Infrastructure less: Specific infrastructure has not been
defined.
I. INTRODUCTION 4. Limitation in nodes: Nodes limitation will lead to less
MANET refers to the way the mobile networks availability.
encompasses the wireless nodes with mobility for 5. Link limitations: Link limitation will pose bandwidth
communication. Thus it consists of set of wireless nodes limitation.
with mobility and ability of communicating with each 6. Multi-hop routing: This type of routing can cause
other in a infrastructure network without centralized fabricated routes within the network.
administration. Nodes organize themselves vigorously in 7. Dynamic topology of network: The topology of
random and leads to unstable topologies. MANET support network changes frequently due to mobility behaviour
range of applications like ad hoc gaming, intelligent of nodes in MANET.
system, smart agriculture, disaster recovery and forest 8. Sharing communication medium: They are shared in
monitoring. nature and leads to more interference.
These applications demand a system that can transfer 9. Openness of network architecture: It has open
reliable information from a source to destination, mobile architecture in nature and hence is prone to many
nodes. The mobile nodes may be subjected to a crucial types of attacks.
attacked. It is so, because a node can receive a packet of 10. Inflexible resource constraints: It has resources
data that is sent within its frequency range. Due to mobility which are inflexible to use.
of nodes, the intermediate node at any time can travel out
of frequency range. The non existence of centralized In [3] author has made survey on fundamental security
control and predetermined infra structure allows any node issues on multi hop network connection in MANET. In [4]
to enter into the network. author has presented the range of security aspects in
In wired networks, measures have to be taken while mobile ad hoc network and dealt with various
communication occurs by use of firewalls and secured characteristics and tools which can be used in MANET.
gateways which provide secure communication though
network. In MANET, frequent change in topology leads to In [5] author has discussed some new security aspects in
lot of vulnerabilities and provide chance to the attackers to fixed infrastructure Wireless Sensor Networks (WSN) and
collapse the network partially or fully. Thus there is a MANETs. The design challenges, issues and services of
necessity to understanding of the various attack related secure group communication over the wireless network are
problems allied with the MANET while routing the given in detail in the work. Authors in [6] have discussed
information [1]. about the security challenges for secured transmission of
The paper is organized in the following sections: Section II information in MANET. Various security issues in
deals with the related work. Section III gives information MANET include availability, integrity, confidentiality,
about different types of attacks prone to routing. Section authentication, non-repudiation, scalability etc. A number
IV gives the security issues and challenges in MANETs. of the techniques used for securing the MANET are
Section V details about security techniques in MANET and prevention, performing detection and reaction approaches.
Section VI gives the conclusion part. These techniques to overcome attacks while routing in

Volume 6, Issue 5, September October 2017 Page 124


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 6, Issue 5, September- October 2017 ISSN 2278-6856
MANET reviewed in the literature are discussed in this packets with a high priority sequences numbers thus
paper discussed. leading to deletion of routes with low sequence
numbers.
III. DIFFERENT TYPES OF ATTACKS 3. Attack by replication of packets: Replication done by
Attackers sensing the data traffic network as depicted in replicating packets by an enemy node, using up extra
figure 1, continuously and intrude themselves into the bandwidth and energy of a node.
route established between the source node and destination 4. Rushing Attack: Protocols at route discovery use
node. In this way attacker take the control of data traffic duplicate repression process [7]. When malicious node
flowing in the network which is shown in figure 2. receives Route Request packet (RREQ), it floods the
packet over network before the nodes which also
received the same packets. The node on receiving
original RREQ, assume that the just received packet as
duplicate and discard the packet. Thus source node
cannot find the secure routes.
5. Cache information corruption Attack
Routing table entries are updated frequently. Attacker
corrupts routing information in cache while routing
[8]. This happens when stored information in the
routing tables is modified, deleted or injected with
false information.
6. Location discovery attack:Intruder identifies the
location of node or structure of network.
Fig. 1 Route between source node 1 and destination node 5 7. Black Hole:In this type, malicious node inserts fake
with no attacker route as shortest path to divert the network traffic or
even inserts a malicious node.
8. Wormhole:In this type of attack, intruder say node X
capture the data traffic and establish link with other
node say Y. Then later inserts this link into network
and controls all nodes in network connected to this
link.

MANETs are analyzed in two wide categories.

Fig. 2 Route between source node 1 and destination node 5 a. Intrusion Detection System (IDS): IDS is a
with attacker denoted by node M security system used for identifying the violations
made for security policies. Certain measures must
As depicted in the figure 2, M acts as a malicious node
which enters route established between sender 1 and be taken if the security is breached in the network.
receiver 5. Various types of IDS include misuse-based,
anomaly-based, specification-based system [9].
Such routing attack stops forwarding of packet in the
network to destination and leads to various vulnerabilities b. Secure routing techniques: These routing
in MANETs. Routing attack advertize routing updates techniques are greatly required for known threats
without considering the specifications of the any routing and attacks in MANET. It includes mechanisms
techniques. Routing protocols are subjected to following
on harder techniques like warm hole and rush
types of attacks.
attacks [10].
1. Overflowing Routing Table: In a proactive routing the
routing table is updated with information routed at Apart from these mechanisms, various security techniques
regular intervals. This attack advertises extreme routes are to be considered as discussed next.
to overflow routing table information of the target
node. It targets that creating of new routes and their IV. SECURITY ISSUES AND
implementation is prevented due the presence of CHALLENGES IN MANET
enough routes and protocol is overwhelmed.
2. Poisoning Routing Table Attack: Nodes information The following discussion highlights the various security
in the route table can be corrupted by the route table issues and design challenges in MANET.
poisoning attack in the network. This attack creates
false routes by broadcasting false information about MANET is considered as self configured network,
traffic and thus creates false entries in the routing connecting mobile nodes. Some of the security issues in
tables of other nodes. Other way is to generate RREQ MANET are listed according to network layers. The layers

Volume 6, Issue 5, September October 2017 Page 125


International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 6, Issue 5, September- October 2017 ISSN 2278-6856
of protocol stack in the network are included for communication. In that aspect, major security issues and
considering the design issues in the MANET [11]. challenges have been addressed while designing of the
protocols.
a. Application layer include detection and prevention of REFERENCES
worms, viruses, malicious codes and application [1] Sarika, S., et al. "Security Issues in Mobile Ad Hoc
abuses. Networks." Procedia Computer Science 92 (2016):
b. Transport layer has authenticates and secures end-to- 329-335.
end information communication through data [2] Garg, Nishu, and R. P. Mahapatra. "Manet security
encryption. issues" IJCSNS 9.8 (2009): 241.
c. Network layer include protection of the ad hoc [3] Yang, Hao, et al. "Security in mobile ad hoc networks:
wirelessly routing protocols. challenges and solutions." IEEE wireless
d. Link layer include protection of the wireless MAC communications 11.1 (2004): 38-47.
layer protocol and support link-layer security. [4] Sogani, Priyanka, and DrAman Jain. "A Study on
e. Physical layer has preventing signal jamming denial- Security Issues in Mobile Ad Hoc Networks." IJIACS
of-service attacks. ISSN (2015): 2347-8616.
V SECURITY TECHNIQUES IN [5] Pandey, Aditi, RajashreeDutta, and RanjanaThalore.
WIRELESS ADHOC NETWORKS "SECURITY SERVICES IN GROUP
There is need to provide security against these attacks and COMMUNICATIONS OVER MOBILE AD HOC
providing high information security in wireless mobile AND WIRELESS SENSOR NETWORKS."
networks are major concern today. Major security connections 6.05 (2017).
mechanisms in are classified into broad categories.The [6] Goyal, Vikas, and GeetaArora. "Review Paper on
major security techniques in MANET are. Security Issues in Mobile Adhoc Networks."
Engineering and Science 2.1 (2017): 203-207.
a. Identity based cryptography: [7] V. Palanisamy, P.Annadurai, Impact of Rushing attack
It is a cryptographic method which includes public key on Multicast in Mobile Ad-hoc Network, (IJCSIS)
for encrypting the files. This technique involves International Journal of Computer Science and
shared key generation, new master key sharing idea, Information Security, Vol. 4, No. 1 & 2, pp:183-189,
certificate chaining method and private key method ISSN:1947-5500, 2009
[12]. [8] K.P.Manikandan, Dr.R.Satyaprasad,
Dr.K.Rajasekhararao, A Survey on Attacks and
b. HMAC (Homomorphic Message Authentication Defense Metrics of Routing Mechanism in Mobile
Code): Adhoc Networks, (IJACSA) International Journal of
It is a cryptographic solution under the network for Advanced Computer Science and Applications, Vol. 2,
inspection the authentication of the code inside the No.3, pp: 7-12, March 2011
sensor nodes. This is a type of symmetric key solution [9] Kalnoor, Gauri, and JayashreeAgarkhed. "Pattern
method. matching intrusion detection technique for Wireless
Sensor Networks." Advances in Electrical,
c. Digital signatures: Electronics, Information, Communication and Bio-
It is a symmetric based cryptographic method for Informatics (AEEICB), 2016 2nd International
encryption and decryption of the data within the Conference on. IEEE, 2016.
network. It works against denial of service attack in [10] Chare, Varsha S., and JayashreePatil. "Secure and
MANET. efficient data transmission in wireless sensor networks
using elliptical curve cryptography." IJARCET 3.7
MANETS are usually more prone to physical threats as (2014).
they have mobile devices connected together. They have [11] Islam, Noman, and Zubair A. Shaikh. "Security issues
movable platforms and therefore have more security in mobile ad hoc network." Wireless networks and
threats in the network. MANET has got lot of security (2013): 49-80.
vulnerabilities due to enormous functions like routing and [12] Narayana, V. Lakshman, and C. R. Bharathi.
packet forwarding etc. "IDENTITY BASED CRYPTOGRAPHY FOR
The security goals are required in MANETs as there are MOBILE AD HOC NETWORKS." Journal of
sensitive in security applications. The well known features Theoretical and Applied Information Technology 95.5
of MANETs are required for wireless technology in order (2017): 1173
to design the network solutions.

VI. CONCLUSION
MANETs have the capacity of self configuring of nodes
and network maintenance. Nodes is MANET are subjected
a lot of issue and challenges to make available a reliable
transmission of information. Thus providing safety
measures has turned out to be a major concern in wireless
Volume 6, Issue 5, September October 2017 Page 126

You might also like