Total views : 265

Survey of Single and Cross Layer Security in MANET

Affiliations

  • Department of Software Engineering, SRM University, Kattankulathur, Kanchipuram – 603203, Tamil Nadu, India
  • Department of CSE, Karpagam College of Engineering, Coimbatore - 641032, Tamil Nadu, India
  • Department of IT, Karpagam College of Engineering, Coimbatore – 641032, Tamil Nadu, India
  • Department of IT, Coimbatore Institute of Engineering and Technology, Coimbatore – 641109, Tamil Nadu, India

Abstract


Various types of portable devices and military applications uses MANET. MANET is infrastructureless one and the security of such a network is a big issue. The detection of misbehavior and intrusions should be done before the attackers affect the network communication so as to keep MANET secure. In this article, a survey regarding single layer and cross layer security solutions for MANET is presented. This paper analyzes the techniques involved in detecting the attacks in each scheme. In this paper the security solutions using single (network) layer against black hole attack is discussed first. Secondly, a brief discussion of cross layer security of the existing works against security attacks using cross layer are given. Finally, the survey is concluded by highlighting open research issues in the field.

Keywords

AODV, Cross Layer Security, MANET, Packet Delivery Ratio, Single Layer Security.

Full Text:

 |  (PDF views: 221)

References


  • Ali Dorri, Kheyrkhah SRKE. Security challenges in mobile adhoc networks: A survey. IJCSES. 2015; 6(1):15–29.
  • Zanoon N, Albdour N, Hamatta HAS, Al-Tarawneh RM. Security challenges as a factor affecting the security of manet: Attacks and security solutions. IJNSA. 2015; 7(3):1–13.
  • Yi S, Kravets R. Composite key management for ad hoc networks. Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services; 2004. p. 52–61.
  • Hu Y, Johnson PA. A survey of secure wireless ad hoc routing. IEEE J of Security and Privacy. 2004; 2(3):28–39.
  • Yang H, Luo H, Ye F, Lu S, Zhang L. Security in MANETs: Challenges and solutions. IEEE J of Wireless Communications. 2003; 11(1):38–47.
  • Agrawal P, Ghosh RK, Das SK. Cooperative black and gray hole attacks in MANETs. Proceedings of ACM 2nd International Conference on Ubiquitous Information Management and Communication; 2008. p. 310–4.
  • Bounpadith K, Nakayama H, Nemoto Y, Kato N, Jamalipour A. A survey of routing attacks in MANETs. IEEE Transactions on Wireless Communications. 2007; 14(5):85–91.
  • Lima M, Dos Santos AL, Pujolle G. A survey of survivability in MANETs. IEEE Communications and Surveys. 2009; 11(1):66–77.
  • Bose U. Comparing the impact of black hole and gray hole attacks in mobile adhoc networks. Procedia Computer Science. 2012; 8(11):1788–802.
  • Agrawal P, Ghosh RK, Das SK. Cooperative black and gray hole attacks in MANETs. Proceedings of ACM 2nd International Conference on Ubiquitous Information Management and Communication; 2008. p. 310–4.
  • Nasipuri A, Casaneda R, Das SR. On-demand multipath routing for MANETs. Proceedings of IEEE INFOCOM; 1999. p. 64–70.
  • Bounpadith K, Nakayama H, Nemoto Y, Kato N, Jamalipour A. A survey of routing attacks in MANETs. IEEE Transactions on Wireless Communications. 2007; 14(5):85–91.
  • QiWang MA, Abu-Rgheff. Cross layer signalling for next generation wireless systems. Proceedings of Wireless Communications and Networking; 2003. p. 1084–9.
  • Vidhya UK, Priya AM. A novel technique for defending routing attacks in OLSR MANET. Proceedings of IEEE International Conference on Computational Intelligence and Computing Research; 2010. p. 1–5.
  • Jawandhiya PM, Ghonge MM, Ali MS, Deshpande JS. A survey of MANET stacks. International Journal of Engineering Science and Technology. 2010; 2(9):4063–71.
  • Denko MK. Detection and prevention of Denial of Service (DoS) attacks in MANETs using reputation-based incentive scheme of systemic. Cybernetics and Informatics. 2006; 3(4):1–9.
  • Ning P, Sun K. How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols. Proceedings of the 4th Annual IEEE Information Assurance Workshop; 2003. p. 60–7.
  • Subathra P, Sivagurunathan S, Ramaraj N. Detection and prevention of single and cooperative black hole attacks in MANETs. International Journal of Business Data Communications and networking. 2010; 6(1):38–57.
  • Xiaopeng G, Wei C. A novel gray hole attack detection scheme for MANETs. Proceedings of IEEE IFIP International Conference on Network and Parallel Computing Workshops; 2007. p. 209–14.
  • Ilyas M. The handbook of ad hoc wireless networks. CRC Press; 2003.
  • Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H. An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the ACM Workshop on Wireless Security; 2002. p. 21–30.
  • Yang H, Luo H, Ye F, Lu S, Zhang L. Security in MANETs: Challenges and solutions. IEEE J of Wireless Communications. 2003; 11(1):38–47.
  • Shen XX, Du DZ. A survey on attacks and countermeasures in MANETs. Proceedings of Wireless/Mobile Network Security Signals and Communication Technology; 2006. p. 103–35.
  • Taggu A. Trace gray: An application-layer scheme for intrusion detection in MANET using mobile agents. Proceedings of 3rd International Conference on Communication Systems and Networks; 2011. p. 1–4.
  • Zapata M. Secure Ad hoc On-Demand Distance Vector (SAODV); 2002. Available from: www.cs.ucsb.edu/~ebelding/txt/saodv.txt
  • Fantahun Y, Zhao A, Xuan C. Preventing black hole attack in mobile ad-hoc networks using anomaly detection. Proceedings of 2nd International Conference on Future Computer and Communication (ICFCC); 2010. p. 21–4.
  • Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures of ad hoc networks. 2003; 1(3):293–315.
  • Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem. Proceedings of IEEE Conference on Military Communications; 2003. p. 735–40.
  • Chun H, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Journal of Ad hoc Networks. 2003; 1(1):175–92.
  • Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K. Prevention of cooperative black hole attack in wireless ad hoc networks. Proceedings of International Conference on Wireless Networks; 2003. p. 23–6.
  • Tamilselvan L, Sankaranarayanan V. Prevention of black hole attack in MANET. Proceedings of IEEE 2nd International Conference on Wireless Broadband and Ultra Wideband Communications; 2007. p. 27–30.
  • Banerjee S. Detection/removal of cooperative black and gray hole attack in MANETs. Proceedings of the World Congress on Engineering and Computer Science; 2008. p. 85–97.
  • Raj PN, Swadas PB. DPRAODV: A dynamic learning system against black hole attack in AODV based MANET. International Journal of Computer Science. 2009; 54–9.
  • Lu S, Li L, Lam K-Y, Jia L. SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of International Conference on Intelligence and Security; 2009. p. 421–5.
  • Jaisankar N, Saravanan R, Swamy K. A novel security approach for detecting black hole attack in MANET. Proceedings of Springer International Conference on Recent Trends in Business Administration and Information; 2010. p. 217–23.
  • Mistry N, Jinwala DC, Zaveri M. Improving AODV protocol against black hole attacks. Proceedings of International Multi Conference of Engineers and Computer Scientists; 2010. p. 17–9.
  • Su MY. Prevention of selective black hole attacks on MANETs through intrusion detection systems. J of Computer communication. 2011; 34(1):107–17.
  • Mahmood AA, Hasan TM, Ibrahim DS. Modified AODV routing protocol to detect the black hole attack in MANET. International Journal of Advanced Research in Computer Science and Software Engineering. 2015; 5(7):173–8.
  • Sun B, Guan Y, Chen J, Pooch UW. Detecting black-hole attack in MANETs. Proceedings of 5th European Personal Mobile Communications Conference; 2003. p. 22–5.
  • Wu C, Wu TK, Cheng RH, Chang SC. A distributed and cooperative black hole node detection and elimination mechanism for ad hoc network. Lecture Notes in Computer Science. 2007; 4819:538–49.
  • Weerasinghe H, Fu H. Preventing cooperative black hole attacks in MANETs: Simulation implementation and evaluation. Proceedings of IEEE Future Generation Communication and Networking; 2007. p. 362–7.
  • Medadian MMH, Yektaie A, Rahmani M. Combat with black hole attack in AODV routing protocol in MANET. Proceedings of IEEE International Conference on 1st Asian Himalayas. 2009. p. 1–5.
  • Kozma W, Lazos L. REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. Proceedings of 2nd ACM Conference on Wireless Network Security; 2009. p. 103–10.
  • Djenouri D, Badache N. Struggling against selfishness and black hole attacks in MANETs. Wiley Wireless Communication and Mobile Computing. 2008; 8(6):689–704.
  • Aad I, Hubaux JP, Knightly EW. Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transaction on Networking. 2008; 16(4):791–802.
  • Nakayama H, Kurosawa S, Jamalipour S, Nemoto Y, Kato N. A dynamic anomaly detection scheme for AODV based MANETs. IEEE Transactions on Vehicular Technology. 2009; 58(5):2471–81.
  • Bajwa SS, Khan MK. Grouped Black Hole Attacks Security Model (GBHASM) for wireless ad-hoc networks. Proceedings of 2nd International Conference on Computer and Automation Engineering; 2010. p. 756–60.
  • Min Y, Yao T, Quan Y. Cross layer ideas in wireless network designs. Proceedings of IEEE International Symposium on Wireless Communications; 2005. p. 891–4.
  • Srivastava V, Motani M. Cross layer design: A survey and the road ahead. IEEE Journals and Communication magazine. 2005; 43(12):112–9.
  • Joseph JFC, Lee B-S, Das A, Seet B-C. Cross layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Transactions on Dependable and Secure Computing. 2011; 8(2):233–45.
  • Thamilarasu G, Sridhar R. CIDS: Cross layer intrusion detection system for MANETs. Proceedings of IEEE International Journal of Mobile Ad hoc and Sensor Systems Conference; 2009. p. 855–61.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.