Skip to main content

Security Issues in Mobile Ad Hoc Network

  • Chapter
Wireless Networks and Security

Part of the book series: Signals and Communication Technology ((SCT))

  • 2649 Accesses

Abstract

Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by lack of prior configuration and the hostile environments. Their unique properties make them a natural candidate for situations where unplanned network establishment is required. However this flexibility leads to a number of security challenges. Security in MANET is a very complex job and requires considerations on the issues spanning across all the layers of communication stack. This chapter reviews the security problem in MANET. It provides an updated account of the security solutions for MANET with detailed discussions on secure routing, intrusion detection system and key management problems. The chapter is concluded with a comprehensive security solution for MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing 90(3), 727–752 (2010)

    Article  MATH  Google Scholar 

  2. IETF. IETF MANET Charter, http://datatracker.ietf.org/wg/manet/charter/ (cited May 2012)

  3. Singh, A., Kumar, M., Rishi, R., Madan, D.K.: A Relative Study of MANET and VANET: Its Applications, Broadcasting Approaches and Challenging Issues. Advances in Networks and Communications, 627–632 (2011)

    Google Scholar 

  4. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless/Mobile Network Security (2006)

    Google Scholar 

  5. Kärpijoki, V.: Security in Ad Hoc Networks. Helsinki University of Technology (2000)

    Google Scholar 

  6. Cayirci, E., Rong, C.: Security in Wireless Ad hoc and Sensor Networks. Wiley Online Library (2009)

    Google Scholar 

  7. Kumar, S., Narender, M., Ramesh, G.N.: Security Provision For Mobile Ad-Hoc Networks Using Ntp & Fuzzy Logic Techniques. Global Journal of Computer Science and Technology (2010)

    Google Scholar 

  8. Seno, S.A.H., Budiarto, R., Wan, T.-C.: SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network. World Applied Sciences Journal (2009)

    Google Scholar 

  9. Michiardi, P., Molva, R.: Ad hoc Networks Security. Mobile Ad hoc Networking, 275–297 (2004)

    Google Scholar 

  10. Fonseca, E., Festag, A.: A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS. NEC Network Laboratories (2006)

    Google Scholar 

  11. Mahapatra, R.P., Katyal, M.: Taxonomy of Routing Security for Ad-Hoc Network. International Journal of Computer Theory and Engineering (2010)

    Google Scholar 

  12. Sreedhar, C., Verma, S.M., Kasiviswanath, N.: A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols. International Journal on Computer Science and Engineering (2010)

    Google Scholar 

  13. Al-Shurman, M., Yoo, S.-M.: Black Hole Attack in Mobile Ad Hoc Networks. In: 42nd Annual Southeast Regional Conference (2004)

    Google Scholar 

  14. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security 5(3) (2007)

    Google Scholar 

  15. Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. IJCSI International Journal of Computer Science Issues 2 (2009)

    Google Scholar 

  16. Buttya, A.G.L., Vajda, I.N.: Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 5(11) (2006)

    Google Scholar 

  17. Kulasekaran, S., Ramkumar, M.: APALLS: A Secure MANET Routing Protocol. Mobile Ad Hoc Networks: Applications (2011)

    Google Scholar 

  18. Lou, W., Liu, W., Zhang, Y., Fang, Y.: SPREAD: Improving Network Security by Multipath Routing in Mobile Ad hoc Networks. Wireless Networks (2009)

    Google Scholar 

  19. Rangara, R.R., Jaipuria, R.S., Yenugwar, G.N., Jawandhiya, P.M.: Intelligent Secure Routing Model For MANET. In: 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2010)

    Google Scholar 

  20. Bhalaji, N.: Reliable Routing against Selective Packet Drop Attack in DSR based MANET. Journal of Software 4(6) (2009)

    Google Scholar 

  21. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.-Y.: Trust Based Routing for Misbehavior Detection in Ad Hoc Networks. Journal of Networks 5(5) (2010)

    Google Scholar 

  22. Elizabeth., N.E., Radha., S., Priyadarshini., S., Jayasree., S., Swathi, K.N.: SRT-Secure Routing using Trust Levels in MANETs. European Journal of Scientific Research 75(3) (2012)

    Google Scholar 

  23. Hong, J.K.A.X.: ANODR: Anonymous On Demand Routing with Untraceable routes for Mobile Ad-hoc Networks. In: 4th ACM International Symposium on Mobile Ad hoc Networking and Computing, MOBIHOC 2003 (2003)

    Google Scholar 

  24. Seys, S., Preneel, B.: ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks. International Journal of Wireless and Mobile Computing (2009)

    Google Scholar 

  25. Li, X., Li, H., Ma, J., Zhang, W.: An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. In: Fifth International Conference on Information Assurance and Security (2009)

    Google Scholar 

  26. Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications (2005)

    Google Scholar 

  27. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks. ACM Transactions on Information and System Security, TISSEC (2008)

    Google Scholar 

  28. Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV Against Wormhole Attacks in Emergency MANET Multimedia Communications. In: 5th International ICST Mobile Multimedia Communications Conference (2009)

    Google Scholar 

  29. Van Der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer Key Management for Mobile Ad hoc Networks. Computing Surveys 39(1), 1 (2007)

    Article  Google Scholar 

  30. Masdari, M., Jabbehdari, S., Ahmadi, M.R., Hashemi, S.M., Bagherzadeh, J., Khadem-Zadeh, A.: A Survey and Taxonomy of Distributed Certificate Authorities in Mobile Ad hoc Networks. EURASIP Journal on Wireless Communications and Networking (2011)

    Google Scholar 

  31. Hegland, A.M., Winjum, E., Mjølsnes, S.F., Rong, C., Kure, Ø., Spilling, P.: A Survey of Key Managemen in Ad Hoc Networks. IEEE Communications Surveys & Tutorials (2006)

    Google Scholar 

  32. Dong, Y., Sui, A.F., Yiu, S.M., Li, V.O.K., Hui, L.C.K.: Providing Distributed Certificate Authority Service in Cluster-based Mobile Ad hoc Networks. Computer Communications 30(11-12), 2442–2452 (2007)

    Article  Google Scholar 

  33. Chaddoud, G., Martin, K.: Distributed Certificate Authority in Cluster-based Ad hoc Nnetworks. In: Wireless Communications and Networking Conference (2006)

    Google Scholar 

  34. John, S.P., Samuel, P.: A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks. Information Security Journal: A Global Perspective 20(4-5), 250–260 (2011)

    Article  Google Scholar 

  35. Konstantinou, E.: Efficient Cluster-based Group Key Agreement Protocols for Wireless Ad hoc Networks. Journal of Network and Computer Applications 34 (2011)

    Google Scholar 

  36. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  37. Silva, E.D., Santos, A.L.D., Albini, A.L.C.P.: Advances in Identity-based Key Management in Mobile Ad hoc Networks: Techniques and Applications. IEEE Wireless Communications (2008)

    Google Scholar 

  38. Balazinska, M., Deshpande, A., Franklin, M.J., Gibbons, P.B., Gray, J., Hansen, M., Liebhold, M., Nath, S., Szalay, A., Tao, V.: Data management in the Worldwide Sensor Web. IEEE Pervasive Computing, 30–40 (2007)

    Google Scholar 

  39. Kapil, A., Rana, S.: Identity-Based Key Management in MANETs using Public Key Cryptography. International Journal of Security (IJS) 3 (2009)

    Google Scholar 

  40. Yu, F.R., Tang, H., Mason, P.C., Wang, F.: A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks. IEEE Transactions On Network And Service Management 7(4) (2010)

    Google Scholar 

  41. Dahshan, H., Irvine, J.: On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks. In: IEEE 69th Vehicular Technology Conference 2009 (2009)

    Google Scholar 

  42. Gordon, R.L., Dawoud, D.S.: Direct and Indirect Trust Establishment in Ad Hoc Networks by Certificate Distribution and Verification. In: First International Conference on Wireless Communication Society, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE 2009) (2009)

    Google Scholar 

  43. Anita, E.A.M., Vasudevan, V.: Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining. International Journal of Computer Applications (2010)

    Google Scholar 

  44. Wua, B., Wua, J., Fernandeza, E.B., Ilyasa, M., Magliveras, S.: Secure and Efficient Key Management in Mobile Ad hoc Networks. Journal of Network and Computer Applications (2005)

    Google Scholar 

  45. Wu, B., Wu, J., Dong, Y.: An Efficient Group Key management Scheme for Mobile Ad hoc Networks. Int. J. Security and Networks (2008)

    Google Scholar 

  46. Pereira, F., Fraga, J.S., Cust’odio, R.: Self-adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad hoc Networks. In: 22nd International Conference on Advanced Information Networking and Applications (2008)

    Google Scholar 

  47. Eschenauer, L., Gligor: A Key-Management Scheme for Distributed Sensor Networks. In: 9th ACM Conference on Computer and Communication Security (2002)

    Google Scholar 

  48. Xenakis, C., Panos, C., Stavrakakis, I.: A Comparative Evaluation of Intrusion Detection Architectures for Mobile Ad Hoc Networks. Elsevier Computers & Security (2010)

    Google Scholar 

  49. Jacoby, G.A., Davis, N.J.: Mobile Host-Based Intrusion Detection and Attack Identification. IEEE Wireless Communications 14(4) (2007)

    Google Scholar 

  50. Nadkarni, K., Mishra, A.: A Novel Intrusion Detection Approach for Wireless Ad Hoc Networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2004 (2004)

    Google Scholar 

  51. Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection techniques for Mobile Wireless Networks. Wireless Networks Journal (2003)

    Google Scholar 

  52. Bhargava, S., Agrawal, D.: Security Enhancements in AODV protocol for Wireless Ad hoc Networks. In: IEEE Vehicular Technology Conf. (2001)

    Google Scholar 

  53. Bose, S., Bharathimurugan, S., Kannan, A.: Multi-Layer Integrated Anomaly Intrusion Detection System for Mobile Ad Hoc Networks. In: IEEE ICSCN 2007. MIT Campus, Anna University (2007)

    Google Scholar 

  54. Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted Intrusion Detection and Response mechanisms for Mobile Ad hoc Networks. Ad Hoc Networks (2008)

    Google Scholar 

  55. Ramachandran, C., Misra, M.O.S.: FORK: A Novel two-pronged Sstrategy for an Agentbased Intrusion Detection Scheme in Ad-hoc Networks. Computer Communications 31(16) (2008)

    Google Scholar 

  56. Ma, C., Fang, Z.: A Novel Intrusion Detection Architecture Based on Adaptive Selection Event Triggering for Mobile Ad-hoc Networks. In: IEEE Second International Symposium on Intelligent Information Technology and Security Informatics (2009)

    Google Scholar 

  57. Manousakis, K., Sterne, D., Ivanic, N., Lawler, G., McAuley, A.: A Stochastic Approximation Approach for Improving Intrusion Detection Data Fusion Structures. In: IEEE Military Communications Conference (MILCOM 2008), San Diego, CA (2008)

    Google Scholar 

  58. Deng, H., Xu, R., Li, J., Zhang, F., Levy, R., Lee, W.: Agent-based Cooperative Anomaly Detection for Wireless Ad hoc Networks. In: 12th Conference on Parallel and Distributed Systems (2006)

    Google Scholar 

  59. Joseph, J.F.C., Das, A., Seet, B.-C., Lee, B.-S.: Cross layer Versus Single Layer Approaches for Intrusion Detection in MANETs. In: 15th IEEE International Conference on Networks (ICON ). IEEE (2007)

    Google Scholar 

  60. Joseph, J.F.C., Das, A., Seet, B.-C., Lee, B.-S.: CRADS: Integrated Cross layer Approach for Detecting Routing Attacks in MANETs. In: WCNC 2008. IEEE (2008)

    Google Scholar 

  61. Rachedi, A., Benslimane, A.: Toward a Cross-layer Monitoring Process for Mobile Ad hoc Networks. Security and Communication Networks (2008)

    Google Scholar 

  62. Hortos, W.S.: Unsupervised Algorithms for Intrusion Detection and Identification in Wireless Ad hoc Sensor Networks. In: SPIE (2009)

    Google Scholar 

  63. Shrestha, R., Han, K.-H., Choi, D.-Y., Han, S.-J.: A Novel Cross Layer Intrusion Detection System in MANET. In: 4th IEEE International Conference on Advanced Information Networking and Applications (2010)

    Google Scholar 

  64. Gottron, C., König, A.E., Steinmetz, R.: A Cross-Layer Approach for Increasing Robustness of Mobile Peer-to-Peer Networks. In: Proceedings of the Security in NGNs and the Future Internet Workshop (2010)

    Google Scholar 

  65. Svecs, I., Sarkar, T., Basu, S., Wong, J.S.: XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. In: 34th Annual IEEE Computer Software and Applications Conference Workshops (2010)

    Google Scholar 

  66. Marchang, N., Tripathi, R.: A Game theoretical approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks. In: 15th Int. Conf. on Advanced Computing and Communications, Guwahati, Assam (2007)

    Google Scholar 

  67. Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P.: A Game-Theoretical Intrusion Detection Model for Mobile Ad Hoc Networks. Computer Communications 31 (2008)

    Google Scholar 

  68. Rafsanjani, M.K., Aliahmadipour, L., Javidi, M.M.: An Optimal Method for Detecting Internal and External Intrusion in MANET. In: Kim, T.-h., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., ÅšlÄ™zak, D. (eds.) FGCN 2010. CCIS, vol. 120, pp. 71–82. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  69. Balachandran, S., Dasgupta, D., Wang, L.: A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks. Computer and Information Science (2006)

    Google Scholar 

  70. Sen, S., Clark, J.A.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks (2011)

    Google Scholar 

  71. Ford, R., Carvalho, M., Allen, W.H., Ham, F.: Adaptive Security for MANETs via Biology. In: 2nd Cyberspace Research Workshop (2009)

    Google Scholar 

  72. Mohamed, Y.A., Abdullah, A.B.: Immune Inspired Framework for Ad Hoc Network Security. In: 7th IEEE International Conference on Control & Automation (ICCA 2009), Christchurch, New Zealand (2009)

    Google Scholar 

  73. Wang, W., Man, H., Liu, Y.: A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Security and Communication Networks (2009)

    Google Scholar 

  74. Mitrokotsa, A., Komninos, N., Douligeris, C.: Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. International Journal of Network Security (2010)

    Google Scholar 

  75. Islam, N., Shaikh, Z.A., Aqeel-ur-Rehman: COINS: Towards a Correlation Based Intrusion Detection System for Mobile Ad hoc Network. Sindh University Research Journal (2011)

    Google Scholar 

  76. Shaikh, R.A., Shaikh, Z.A.: A Security Architecture for Multihop Mobile Ad hoc Networks with Mobile Agents. In: 9th International Multitopic Conference, IEEE INMIC 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noman Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Islam, N., Shaikh, Z.A. (2013). Security Issues in Mobile Ad Hoc Network. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36169-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36168-5

  • Online ISBN: 978-3-642-36169-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics