| Peer-Reviewed

Security in Ad Hoc Networks

Received: 22 December 2014     Accepted: 25 December 2014     Published: 28 January 2015
Views:       Downloads:
Abstract

Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.

Published in American Journal of Networks and Communications (Volume 4, Issue 3-1)

This article belongs to the Special Issue Ad Hoc Networks

DOI 10.11648/j.ajnc.s.2015040301.16
Page(s) 27-34
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2015. Published by Science Publishing Group

Keywords

ARPANET, MANET, OSPF, QOS.

References
[1] Security in Ad Hoc Networks, Vesa Kärpijoki, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Vesa.Karpijoki@hut.fi
[2] Secure Ad Hoc Networking, Panagiotis Papadimitratos, Virginia Polytechnic, Institute and State University, papadp@vt.edu
[3] http://itlaw.wikia.com/wiki/Ad-hoc_mode
[4] Security for Ad Hoc Networks, Hang Zhao.
[5] Data Communication & Networking, Forouzan.
[6] D. M. Blough et al. On the Symmetric Range Assignment Problem in Wireless Ad Hoc Networks. In Proceedings of IFIP Conference on Theoretical Computer Science, pages 71–82, 2002.
[7] Marina and S. R. Das. Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks. In Proceedings of ACM MobiHoc, pages 12–23, 2002.
[8] (Haas and Liang, 1999; Royer and Toh, 1999)
[9] Securing Ad Hoc Networks, Lidong Zhou, Department of Computer Science, Zygmunt J. Haas, School of Electrical Engineering
[10] Karan Singh, R. S. Yadav, Ranvijay, International Journal of Computer Science and Security, Volume (1): Issue (1) 52
[11] A REVIEW PAPER ON AD HOC NETWORK SECURITY
[12] K. Balakrishnan, J. Deng, and P.K. Varshney, “TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005
[13] Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black Hole Attack in Mobile Ad Hoc Networks” ACMSE’04, April 2-3, 2004, Huntsville, AL, USA.
[14] Yih-Chun Hu, Adrian Perrig, and David B. Johnson., “Packet Leashes A Defense against Wormhole Attacks in Wireless Ad Hoc Networks” In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003.
[15] Patroklos g. Argyroudis and donal o’mahony, “Secure Routing for Mobile Ad hoc Networks”, IEEE Communications Surveys & Tutorials Third Quarter 2005
[16] I. Aad, J.-P. Hubaux, and E-W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” Proc. MobiCom, 2004
[17] Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols” WiSe 2003, September 19, 2003, San Diego, California, USA.
[18] S. Prakash, J.P. Saini, S.C. Gupta, "Methodologies and Applications of Wireless Mobile Ad-hoc Networks Routing Protocols", International Journal of Applied Information Systems, Vol. 1, No. 6, pp. 5-15, February 2012.
[19] D. Johnson, D. Maltz, Y. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)”, IETF Internet-Draft, 2011.
[20] N.S.M. Usop, A. Abdullah, "Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, Vol. 9, No.7, pp.261-268, July 2009.
[21] A. Akbari, M. Soruri, A. Khosrozadeh, "A New AODV Routing Protocol in Mobile Adhoc Networks", World Applied Sciences Journal, Vol. 19, No. 4, pp. 478-485, 2012.
[22] D. Benetti, M. Merro, L.Viganò, “Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA”, IEEE 8th International Conference on Software Engineering and Formal Methods (SEFM), Pisa, pp. 191-202, Sep 2010.
[23] Smith, S. Murthy, J.J. Garcia-Luna-Aceves, "Securing Distance Vector Routing Protocols", in Internet Society Symposium on Network and Distributed System Security, the 7th International Workshop on Security Protocols, San Diego, CA, USA, pp. 85-92, Feb 1997.
[24] Y.C. Hu, D.B. Johnson, A. Perrig, "Secure efficient distance vector routing in mobile wireless ad hoc networks", in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and
[25] Applications(WMCSA’02) , pp. 3-13, June 2002.
[26] Jacquet, P. et al. Optimized Link-State Routing Protocol (OLSR). IETF draft, 18 July 2000. [referred 25.9.2000] [in ASCII format]
[27] Zhou, L. and Haas, Z. Securing Ad Hoc Networks. 1999. [referred 25.9.2000] [in PostScript format]
[28] S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, October 2001.
[29] J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139–145, 2001.
[30] Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM’02, 2002.
[31] S. Jacobs and M. S. Corson. MANET authentication architecture. Internet draftdraft-jacobs-imep-auth-arch-01.txt, expired 2000, February 1999.
[32] P. Papadimitratos and Z. J. Hass. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 2002.
[33] A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Spins: Security protocols for sensor networks. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.
[34] B. R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Securing distancevector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, pages 85–92, San Diego, California, February 1997
[35] M. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, September 2002.
Cite This Article
  • APA Style

    Sanjana Lakkadi, Amit Mishra, Manish Bhardwaj. (2015). Security in Ad Hoc Networks. American Journal of Networks and Communications, 4(3-1), 27-34. https://doi.org/10.11648/j.ajnc.s.2015040301.16

    Copy | Download

    ACS Style

    Sanjana Lakkadi; Amit Mishra; Manish Bhardwaj. Security in Ad Hoc Networks. Am. J. Netw. Commun. 2015, 4(3-1), 27-34. doi: 10.11648/j.ajnc.s.2015040301.16

    Copy | Download

    AMA Style

    Sanjana Lakkadi, Amit Mishra, Manish Bhardwaj. Security in Ad Hoc Networks. Am J Netw Commun. 2015;4(3-1):27-34. doi: 10.11648/j.ajnc.s.2015040301.16

    Copy | Download

  • @article{10.11648/j.ajnc.s.2015040301.16,
      author = {Sanjana Lakkadi and Amit Mishra and Manish Bhardwaj},
      title = {Security in Ad Hoc Networks},
      journal = {American Journal of Networks and Communications},
      volume = {4},
      number = {3-1},
      pages = {27-34},
      doi = {10.11648/j.ajnc.s.2015040301.16},
      url = {https://doi.org/10.11648/j.ajnc.s.2015040301.16},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.s.2015040301.16},
      abstract = {Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Security in Ad Hoc Networks
    AU  - Sanjana Lakkadi
    AU  - Amit Mishra
    AU  - Manish Bhardwaj
    Y1  - 2015/01/28
    PY  - 2015
    N1  - https://doi.org/10.11648/j.ajnc.s.2015040301.16
    DO  - 10.11648/j.ajnc.s.2015040301.16
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 27
    EP  - 34
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.s.2015040301.16
    AB  - Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.
    VL  - 4
    IS  - 3-1
    ER  - 

    Copy | Download

Author Information
  • Department of Computer science and Engineering, SRM University, NCR Campus, Modinagar, Ghaziabad, India

  • Department of Computer science and Engineering, SRM University, NCR Campus, Modinagar, Ghaziabad, India

  • Department of Computer science and Engineering, SRM University, NCR Campus, Modinagar, Ghaziabad, India

  • Sections