Abstract
Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by lack of prior configuration and the hostile environments. Their unique properties make them a natural candidate for situations where unplanned network establishment is required. However this flexibility leads to a number of security challenges. Security in MANET is a very complex job and requires considerations on the issues spanning across all the layers of communication stack. This chapter reviews the security problem in MANET. It provides an updated account of the security solutions for MANET with detailed discussions on secure routing, intrusion detection system and key management problems. The chapter is concluded with a comprehensive security solution for MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90(3), 727–752 (2010)
IETF. IETF MANET Charter, http://datatracker.ietf.org/wg/manet/charter/ (cited May 2012)
Singh, A., Kumar, M., Rishi, R., Madan, D.K.: A Relative Study of MANET and VANET: Its Applications, Broadcasting Approaches and Challenging Issues. Advances in Networks and Communications, 627–632 (2011)
Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security (2006)
Kärpijoki, V.: Security in Ad Hoc Networks. Helsinki University of Technology (2000)
Cayirci, E., Rong, C.: Security in Wireless Ad hoc and Sensor Networks. Wiley Online Library (2009)
Kumar, S., Narender, M., Ramesh, G.N.: Security Provision For Mobile Ad-Hoc Networks Using Ntp & Fuzzy Logic Techniques. Global Journal of Computer Science and Technology (2010)
Seno, S.A.H., Budiarto, R., Wan, T.-C.: SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network. World Applied Sciences Journal (2009)
Michiardi, P., Molva, R.: Ad hoc Networks Security. Mobile Ad hoc Networking, 275–297 (2004)
Fonseca, E., Festag, A.: A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS. NEC Network Laboratories (2006)
Mahapatra, R.P., Katyal, M.: Taxonomy of Routing Security for Ad-Hoc Network. International Journal of Computer Theory and Engineering (2010)
Sreedhar, C., Verma, S.M., Kasiviswanath, N.: A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols. International Journal on Computer Science and Engineering (2010)
Al-Shurman, M., Yoo, S.-M.: Black Hole Attack in Mobile Ad Hoc Networks. In: 42nd Annual Southeast Regional Conference (2004)
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security 5(3) (2007)
Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. IJCSI International Journal of Computer Science Issues 2 (2009)
Buttya, A.G.L., Vajda, I.N.: Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(11) (2006)
Kulasekaran, S., Ramkumar, M.: APALLS: A Secure MANET Routing Protocol. Mobile Ad Hoc Networks: Applications (2011)
Lou, W., Liu, W., Zhang, Y., Fang, Y.: SPREAD: Improving Network Security by Multipath Routing in Mobile Ad hoc Networks. Wireless Networks (2009)
Rangara, R.R., Jaipuria, R.S., Yenugwar, G.N., Jawandhiya, P.M.: Intelligent Secure Routing Model For MANET. In: 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2010)
Bhalaji, N.: Reliable Routing against Selective Packet Drop Attack in DSR based MANET. Journal of Software 4(6) (2009)
Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.-Y.: Trust Based Routing for Misbehavior Detection in Ad Hoc Networks. Journal of Networks 5(5) (2010)
Elizabeth., N.E., Radha., S., Priyadarshini., S., Jayasree., S., Swathi, K.N.: SRT-Secure Routing using Trust Levels in MANETs. European Journal of Scientific Research 75(3) (2012)
Hong, J.K.A.X.: ANODR: Anonymous On Demand Routing with Untraceable routes for Mobile Ad-hoc Networks. In: 4th ACM International Symposium on Mobile Ad hoc Networking and Computing, MOBIHOC 2003 (2003)
Seys, S., Preneel, B.: ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks. International Journal of Wireless and Mobile Computing (2009)
Li, X., Li, H., Ma, J., Zhang, W.: An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. In: Fifth International Conference on Information Assurance and Security (2009)
Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications (2005)
Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks. ACM Transactions on Information and System Security, TISSEC (2008)
Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: 5th International ICST Mobile Multimedia Communications Conference (2009)
Van Der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer Key Management for Mobile Ad hoc Networks. Computing Surveys 39(1), 1 (2007)
Masdari, M., Jabbehdari, S., Ahmadi, M.R., Hashemi, S.M., Bagherzadeh, J., Khadem-Zadeh, A.: A Survey and Taxonomy of Distributed Certificate Authorities in Mobile Ad hoc Networks. EURASIP Journal on Wireless Communications and Networking (2011)
Hegland, A.M., Winjum, E., Mjølsnes, S.F., Rong, C., Kure, Ø., Spilling, P.: A Survey of Key Managemen in Ad Hoc Networks. IEEE Communications Surveys & Tutorials (2006)
Dong, Y., Sui, A.F., Yiu, S.M., Li, V.O.K., Hui, L.C.K.: Providing Distributed Certificate Authority Service in Cluster-based Mobile Ad hoc Networks. Computer Communications 30(11-12), 2442–2452 (2007)
Chaddoud, G., Martin, K.: Distributed Certificate Authority in Cluster-based Ad hoc Nnetworks. In: Wireless Communications and Networking Conference (2006)
John, S.P., Samuel, P.: A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks. Information Security Journal: A Global Perspective 20(4-5), 250–260 (2011)
Konstantinou, E.: Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad hoc Networks. Journal of Network and Computer Applications 34 (2011)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Silva, E.D., Santos, A.L.D., Albini, A.L.C.P.: Advances in Identity-based Key Management in Mobile Ad hoc Networks: Techniques and Applications. IEEE Wireless Communications (2008)
Balazinska, M., Deshpande, A., Franklin, M.J., Gibbons, P.B., Gray, J., Hansen, M., Liebhold, M., Nath, S., Szalay, A., Tao, V.: Data management in the Worldwide Sensor Web. IEEE Pervasive Computing, 30–40 (2007)
Kapil, A., Rana, S.: Identity-Based Key Management in MANETs using Public Key Cryptography. International Journal of Security (IJS) 3 (2009)
Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks. IEEE Transactions On Network And Service Management 7(4) (2010)
Dahshan, H., Irvine, J.: On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks. In: IEEE 69th Vehicular Technology Conference 2009 (2009)
Gordon, R.L., Dawoud, D.S.: Direct and Indirect Trust Establishment in Ad Hoc Networks by Certificate Distribution and Verification. In: First International Conference on Wireless Communication Society, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE 2009) (2009)
Anita, E.A.M., Vasudevan, V.: Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining. International Journal of Computer Applications (2010)
Wua, B., Wua, J., Fernandeza, E.B., Ilyasa, M., Magliveras, S.: Secure and Efficient Key Management in Mobile Ad hoc Networks. Journal of Network and Computer Applications (2005)
Wu, B., Wu, J., Dong, Y.: An Efficient Group Key management Scheme for Mobile Ad hoc Networks. Int. J. Security and Networks (2008)
Pereira, F., Fraga, J.S., Cust’odio, R.: Self-adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad hoc Networks. In: 22nd International Conference on Advanced Information Networking and Applications (2008)
Eschenauer, L., Gligor: A Key-Management Scheme for Distributed Sensor Networks. In: 9th ACM Conference on Computer and Communication Security (2002)
Xenakis, C., Panos, C., Stavrakakis, I.: A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks. Elsevier Computers & Security (2010)
Jacoby, G.A., Davis, N.J.: Mobile Host-Based Intrusion Detection and Attack Identification. IEEE Wireless Communications 14(4) (2007)
Nadkarni, K., Mishra, A.: A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2004 (2004)
Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection techniques for Mobile Wireless Networks. Wireless Networks Journal (2003)
Bhargava, S., Agrawal, D.: Security Enhancements in AODV protocol for Wireless Ad hoc Networks. In: IEEE Vehicular Technology Conf. (2001)
Bose, S., Bharathimurugan, S., Kannan, A.: Multi-Layer Integrated Anomaly Intrusion Detection System for Mobile Ad Hoc Networks. In: IEEE ICSCN 2007. MIT Campus, Anna University (2007)
Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted Intrusion Detection and Response mechanisms for Mobile Ad hoc Networks. Ad Hoc Networks (2008)
Ramachandran, C., Misra, M.O.S.: FORK: A Novel two-pronged Sstrategy for an Agentbased Intrusion Detection Scheme in Ad-hoc Networks. Computer Communications 31(16) (2008)
Ma, C., Fang, Z.: A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks. In: IEEE Second International Symposium on Intelligent Information Technology and Security Informatics (2009)
Manousakis, K., Sterne, D., Ivanic, N., Lawler, G., McAuley, A.: A Stochastic Approximation Approach for Improving Intrusion Detection Data Fusion Structures. In: IEEE Military Communications Conference (MILCOM 2008), San Diego, CA (2008)
Deng, H., Xu, R., Li, J., Zhang, F., Levy, R., Lee, W.: Agent-based Cooperative Anomaly Detection for Wireless Ad hoc Networks. In: 12th Conference on Parallel and Distributed Systems (2006)
Joseph, J.F.C., Das, A., Seet, B.-C., Lee, B.-S.: Cross layer Versus Single Layer Approaches for Intrusion Detection in MANETs. In: 15th IEEE International Conference on Networks (ICON ). IEEE (2007)
Joseph, J.F.C., Das, A., Seet, B.-C., Lee, B.-S.: CRADS: Integrated Cross layer Approach for Detecting Routing Attacks in MANETs. In: WCNC 2008. IEEE (2008)
Rachedi, A., Benslimane, A.: Toward a Cross-layer Monitoring Process for Mobile Ad hoc Networks. Security and Communication Networks (2008)
Hortos, W.S.: Unsupervised Algorithms for Intrusion Detection and Identification in Wireless Ad hoc Sensor Networks. In: SPIE (2009)
Shrestha, R., Han, K.-H., Choi, D.-Y., Han, S.-J.: A Novel Cross Layer Intrusion Detection System in MANET. In: 4th IEEE International Conference on Advanced Information Networking and Applications (2010)
Gottron, C., König, A.E., Steinmetz, R.: A Cross-Layer Approach for Increasing Robustness of Mobile Peer-to-Peer Networks. In: Proceedings of the Security in NGNs and the Future Internet Workshop (2010)
Svecs, I., Sarkar, T., Basu, S., Wong, J.S.: XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. In: 34th Annual IEEE Computer Software and Applications Conference Workshops (2010)
Marchang, N., Tripathi, R.: A Game theoretical approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks. In: 15th Int. Conf. on Advanced Computing and Communications, Guwahati, Assam (2007)
Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A Game-Theoretical Intrusion Detection Model for Mobile Ad Hoc Networks. Computer Communications 31 (2008)
Rafsanjani, M.K., Aliahmadipour, L., Javidi, M.M.: An Optimal Method for Detecting Internal and External Intrusion in MANET. In: Kim, T.-h., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds.) FGCN 2010. CCIS, vol. 120, pp. 71–82. Springer, Heidelberg (2010)
Balachandran, S., Dasgupta, D., Wang, L.: A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks. Computer and Information Science (2006)
Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks (2011)
Ford, R., Carvalho, M., Allen, W.H., Ham, F.: Adaptive Security for MANETs via Biology. In: 2nd Cyberspace Research Workshop (2009)
Mohamed, Y.A., Abdullah, A.B.: Immune Inspired Framework for Ad Hoc Network Security. In: 7th IEEE International Conference on Control & Automation (ICCA 2009), Christchurch, New Zealand (2009)
Wang, W., Man, H., Liu, Y.: A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security and Communication Networks (2009)
Mitrokotsa, A., Komninos, N., Douligeris, C.: Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. International Journal of Network Security (2010)
Islam, N., Shaikh, Z.A., Aqeel-ur-Rehman: COINS: Towards a Correlation Based Intrusion Detection System for Mobile Ad hoc Network. Sindh University Research Journal (2011)
Shaikh, R.A., Shaikh, Z.A.: A Security Architecture for Multihop Mobile Ad hoc Networks with Mobile Agents. In: 9th International Multitopic Conference, IEEE INMIC 2005 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Islam, N., Shaikh, Z.A. (2013). Security Issues in Mobile Ad Hoc Network. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-36169-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36168-5
Online ISBN: 978-3-642-36169-2
eBook Packages: EngineeringEngineering (R0)