A Survey On Security Issues In Routing In MANETS

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-5                           
Year of Publication : 2013
Authors : C Sreedhar , Varun Varma Sangaraju

MLA

C Sreedhar , Varun Varma Sangaraju. "A Survey On Security Issues In Routing In MANETS" . International Journal of Computer & organization Trends (IJCOT), V3(9):22-26 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract—Mobile Ad-hoc Network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A MANET is a type of ad-hoc network that can change locations and configure itself on the fly. Because MANETS are mobile, they use wireless connections to connect to various networks to accommodate the changing topology special routing algorithms are needed. There is no single protocol that fits all networks perfectly. The protocols have to be chosen according to network characteristics, such as density, size and the mobility of the nodes. In this paper, we make an attempt to address the various security issues and various attacks and challenges faced by the routing protocols in MANETs. There is still ongoing research on mobile ad-hoc networks and the research may lead to even better protocols and will probably face new challenges. Current goal of this paper is to find out the security issues and challenges of routing in MANETs.

References-

[1] C.E.Perkins and E.M.Royer, “Ad-Hoc on Demand Distance Vector Routing”, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.90-100, Feb, 1999.
[2] C Sreedhar, Dr. S. Madhusudhana Verma, Dr. N. Kasiviswanath, “Potential Security Attacks on Wireless Networks and their Countermeasures”, In IJCSIT, Vol.02, No. 05. .
[3] Perkins C., Belding-Royer E., Das S., “RFC 3561: Ad hoc On-Demand Distance Vector (AODV) Routing”, http://www.ietf.org/rfc/rfc3561.txt, 2003.
[4] Ning P., Sun K., “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols”, In Proc. of the IEEE Workshop on Information Assurance, pp. 60-67, 2003.
[5] Chivers H., Clark J. A., “Smart dust, friend or foe?--Replacing identity with configuration trust”, Computer Networks 46(5), pp. 723-740, 2004.
[6] Sun B., Wu K., Pooch U.W., “Zone-Based Intrusion Detection for Mobile Ad Hoc Networks”, Int. Journal of Ad Hoc and Sensor Wireless Networks, vol.2 , no. 3, 2003.
[7] Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens, An On-Demand Secure Routing Protocol Resilent to Byzantine Failures, In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 28 2002.
[8] Pietro Michiardi and Refik Molva, Ad hoc networks security , In ST Journal of System Research, Volume 4, March 2003
[9] Pietro Michiardi and Refik Molva .Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks , European Wireless Conference, 2002
[10] L.Zhou and Z. hass. Securing ad hoc networks. IEEE Network. 13(6):24-30, November/December 1999.
[11] Sheng Zhong, Jiang Chen, and Yang Richard Yang, Sprite: A simple, Cheat-proof, Credit-based System for Mobile Ad hoc Networks, in Proceedings of IEEE Infocom '03, San Francisco, CA, April 2003.
[12] Pietro Michiardi and Refik Molva .Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks , European Wireless Conference, 2002 .
[13] Peng Ning, Kun Sun, How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols, in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
[14] Shahan Yang and John S. Baras, Modeling Vulnerabilities of Ad Hoc Routing Protocols. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA.
[15] Y-C Hu, A. Perrig, D. B. Johnson, Ariadne : A secure On-Demand Routing Protocol for Ad Hoc Networks, in proceedings of MOBICOM 2002.
[16] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer. A secure routing protocol for ad hoc networks. Technical Report 01-37, Department of Computer Science, University of Massachusetts, August 2001 .
[17] Peng Ning, Kun Sun, How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols, in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
[18] Shahan Yang and John S. Baras, Modeling Vulnerabilities of Ad Hoc Routing Protocols. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA.
[19] C Sreedhar, Dr. S. Madhusudhana Verma, Dr. N. Kasiviswanath, “ Performance Analysis Secure Routing Protocols in Mobile Ad-Hoc Networks”, In IJCST, Vol.03, Issue 1.
[20] A. Martin, J. Smith, and M. Koethe, “A Platform Independent Model and Threat Analysis for Mobile Ad hoc Networks”, proc. of the 2007 Software Defined Radio Technical Conference, Denver, Colorado, Nov. 2007.

Keywords— MANETs, Routing Protocols, Security.