Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.
Published in |
American Journal of Networks and Communications (Volume 4, Issue 3-1)
This article belongs to the Special Issue Ad Hoc Networks |
DOI | 10.11648/j.ajnc.s.2015040301.16 |
Page(s) | 27-34 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2015. Published by Science Publishing Group |
ARPANET, MANET, OSPF, QOS.
[1] | Security in Ad Hoc Networks, Vesa Kärpijoki, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Vesa.Karpijoki@hut.fi |
[2] | Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic, Institute and State University, papadp@vt.edu |
[3] | http://itlaw.wikia.com/wiki/Ad-hoc_mode |
[4] | Security for Ad Hoc Networks, Hang Zhao. |
[5] | Data Communication & Networking, Forouzan. |
[6] | D. M. Blough et al. On the Symmetric Range Assignment Problem in Wireless Ad Hoc Networks. In Proceedings of IFIP Conference on Theoretical Computer Science, pages 71–82, 2002. |
[7] | Marina and S. R. Das. Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks. In Proceedings of ACM MobiHoc, pages 12–23, 2002. |
[8] | (Haas and Liang, 1999; Royer and Toh, 1999) |
[9] | Securing Ad Hoc Networks, Lidong Zhou, Department of Computer Science, Zygmunt J. Haas, School of Electrical Engineering |
[10] | Karan Singh, R. S. Yadav, Ranvijay, International Journal of Computer Science and Security, Volume (1): Issue (1) 52 |
[11] | A REVIEW PAPER ON AD HOC NETWORK SECURITY |
[12] | K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005 |
[13] | Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black Hole Attack in Mobile Ad Hoc Networks” ACMSE’04, April 2-3, 2004, Huntsville, AL, USA. |
[14] | Yih-Chun Hu, Adrian Perrig, and David B. Johnson., “Packet Leashes A Defense against Wormhole Attacks in Wireless Ad Hoc Networks” In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003. |
[15] | Patroklos g. Argyroudis and donal o’mahony, “Secure Routing for Mobile Ad hoc Networks”, IEEE Communications Surveys & Tutorials Third Quarter 2005 |
[16] | I. Aad, J.-P. Hubaux, and E-W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. MobiCom, 2004 |
[17] | Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols” WiSe 2003, September 19, 2003, San Diego, California, USA. |
[18] | S. Prakash, J.P. Saini, S.C. Gupta, "Methodologies and Applications of Wireless Mobile Ad-hoc Networks Routing Protocols", International Journal of Applied Information Systems, Vol. 1, No. 6, pp. 5-15, February 2012. |
[19] | D. Johnson, D. Maltz, Y. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, IETF Internet-Draft, 2011. |
[20] | N.S.M. Usop, A. Abdullah, "Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, Vol. 9, No.7, pp.261-268, July 2009. |
[21] | A. Akbari, M. Soruri, A. Khosrozadeh, "A New AODV Routing Protocol in Mobile Adhoc Networks", World Applied Sciences Journal, Vol. 19, No. 4, pp. 478-485, 2012. |
[22] | D. Benetti, M. Merro, L.Viganò, “Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA”, IEEE 8th International Conference on Software Engineering and Formal Methods (SEFM), Pisa, pp. 191-202, Sep 2010. |
[23] | Smith, S. Murthy, J.J. Garcia-Luna-Aceves, "Securing Distance Vector Routing Protocols", in Internet Society Symposium on Network and Distributed System Security, the 7th International Workshop on Security Protocols, San Diego, CA, USA, pp. 85-92, Feb 1997. |
[24] | Y.C. Hu, D.B. Johnson, A. Perrig, "Secure efficient distance vector routing in mobile wireless ad hoc networks", in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and |
[25] | Applications(WMCSA’02) , pp. 3-13, June 2002. |
[26] |
Jacquet, P. et al. Optimized Link-State Routing Protocol (OLSR). IETF draft, 18 July 2000. [referred 25.9.2000] |
[27] |
Zhou, L. and Haas, Z. Securing Ad Hoc Networks. 1999. [referred 25.9.2000] |
[28] | S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001. |
[29] | J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139–145, 2001. |
[30] | Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM’02, 2002. |
[31] | S. Jacobs and M. S. Corson. MANET authentication architecture. Internet draftdraft-jacobs-imep-auth-arch-01.txt, expired 2000, February 1999. |
[32] | P. Papadimitratos and Z. J. Hass. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002. |
[33] | A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001. |
[34] | B. R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distancevector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, pages 85–92, San Diego, California, February 1997 |
[35] | M. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, September 2002. |
APA Style
Sanjana Lakkadi, Amit Mishra, Manish Bhardwaj. (2015). Security in Ad Hoc Networks. American Journal of Networks and Communications, 4(3-1), 27-34. https://doi.org/10.11648/j.ajnc.s.2015040301.16
ACS Style
Sanjana Lakkadi; Amit Mishra; Manish Bhardwaj. Security in Ad Hoc Networks. Am. J. Netw. Commun. 2015, 4(3-1), 27-34. doi: 10.11648/j.ajnc.s.2015040301.16
AMA Style
Sanjana Lakkadi, Amit Mishra, Manish Bhardwaj. Security in Ad Hoc Networks. Am J Netw Commun. 2015;4(3-1):27-34. doi: 10.11648/j.ajnc.s.2015040301.16
@article{10.11648/j.ajnc.s.2015040301.16, author = {Sanjana Lakkadi and Amit Mishra and Manish Bhardwaj}, title = {Security in Ad Hoc Networks}, journal = {American Journal of Networks and Communications}, volume = {4}, number = {3-1}, pages = {27-34}, doi = {10.11648/j.ajnc.s.2015040301.16}, url = {https://doi.org/10.11648/j.ajnc.s.2015040301.16}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.s.2015040301.16}, abstract = {Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.}, year = {2015} }
TY - JOUR T1 - Security in Ad Hoc Networks AU - Sanjana Lakkadi AU - Amit Mishra AU - Manish Bhardwaj Y1 - 2015/01/28 PY - 2015 N1 - https://doi.org/10.11648/j.ajnc.s.2015040301.16 DO - 10.11648/j.ajnc.s.2015040301.16 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 27 EP - 34 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.s.2015040301.16 AB - Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication. VL - 4 IS - 3-1 ER -