You are on page 1of 8

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <

Mobile Ad-hoc Network (MANETS): Security Related Issues


Neha Shinde M.Tech* Student Medicaps Institute of Science and Technology Pigdumber, Rau, Indore (M.P.) nehacs442@gmail.com
are likely to be discovered in near future. So Securi ty issues in MANETs will remain a potential research area in near future. The rest of the paper is organized as follows. Section 2 will illustrate about MANETs. Section 4 will raise the problems of secuirity in MANETs. Further sections deals with some of the solutions to these problems. Finally Section 10 concludes this article. 2 Mobile Adh oc N tworks e 2.1.Introduction Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others needs the aid of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the help of any infrastructure. This property makes these networks highly flexible and robust. The infrastructure-less, self-forming, and self-healing networking properties make MANET ideally suitable for networking applications. So that, most of the effort in this area has been directed toward implementing MANET over wideband high-speed data waveforms. The characteristics of these networks are summarized as follows:

Abstract Most of the research in MANETS has been focused on Routing issues. Security on the other hand has been given low priority. This paper provides an introduction to Mobile Adhoc Networks, Routing related issues and overview of security problems for MANETS, by distinguishing the threats on the basic mechanisms and security mechanisms. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it then address the possible solution to protect the security mechanism, which involve Availability, integrity, authentication and non repudiation. Finally w e survey the current security solutions for the mobile ad hoc network. Index Terms MANET, Security issues, Solution, Routing.

I. INTRODUCTION

n circumstances where mobile telephony as we know it is not possible or difficult, perhaps internet technology can be of help. The dependency on a costly telecom infrastructure could thereby be decreased, which would be quite welcome considering the current situation in the telecom world. The technology that is to make this possible is MANet, or Mobile Adhoc Networking. The solution lies in the mobile device itself. Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing to forward to packets for other n o d e s . Application such as military exercises, disaster relief, and mine site operation may benefit from adhoc networking, but secure and reliable communication is a necessary pre- requisite for such applications. MANETS are more vulnerable to attacks than wired networks due to open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and lack of clear line of defense. Security i s a process that is as secure as its weakest link. So, in order to make MANETs secure, all its weak points are to be identified and solutions to make all those weak points safe, are to be considered. Some of the weak points and solutions to strengthen them are considered in this article. However the list is possibly incomplete, and some more weak points of MANETs

Fig. 1. An Example of MANET

Communication via wireless means. Nodes can perform the roles of both hosts and routers. No centralized controller and infrastructure. Intrinsic mutual trust.

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Dynamic network topology. Freque nt routing updates. 2.2 Ad vantages and Applications The following are the advantages of MANETs: They provide access to information and services regardless of geographic position. These networks can be set up at any place and time. Some of the applications of MANETs are Military or police exercises. Disaster relief operations. Mine cite operations. Urgent Business meetings. blurred that is used to separates inside network from the outside network. Due to all this there is no well defined infrastructure in order to deploy single security solution over MANET. According to security information with respect to MANET network are vulnerable compromises or physical capture, especially at the end of low-end devices due to weak protection. Intruders enter into the network and poses weakest link and incur a domino effect of security in the network. According to wireless channel is concerned bandwidth is one of constrained and use to share among multiple different network nodes. There is also one more restriction that is computation capability; like low-end devices for e.g. PDAs, can hardly perform low computation due to this way they usually use asymmetric cryptographic computation which is bit low complex, because mobile devices have very limited energy resources due to this way mostly mobile devices powered by batteries.
Table I The security solutions for MANETs with respect to entire protocol Stack S.No . 1 Layer Application Layer Security Issues In this layer we should prevent malicious nodes. 2 Transport Layer It provide authentication and provide secure end-to-end communications encryption between two nodes. 3 Network Layer This layer deals with the protection of routing as well as forwarding protocols. 4
Data Link Layer

3. BACKGROUND In this section we will discuss background of the problem and discuss what have others already done? 3.1 Description There are some ultimate goals regarding security solutions with respect to Mobile ad hoc networks or we can say there are some security services which should be fulfill in order to enforce security like authentication, confidentiality, integrity to mobile users, we also use another term for them CIA which should be fulfill. In order to achieve goal in security, whatever the security solution it is? But it should provide complete protection to entire protocol stack. Table 2.1 shows the security issues with respect to each layer. In this paper we will consider a fundamental security problem in MANET: We can say that first protect the network connectivity between mobile nodes and then provide potentially multihop wireless channels, which is one of the basic steps to support network security services. Multihop connection established between two nodes in mobile ad hoc network through two steps: 1. It ensuring one-hop connection through link-layer protocols like wireless medium access control (MAC). 2. Through network layer it will extend connection between multiple hops and provide routing and data forwarding protocols. As argued in [6], security is a chain, and it is only as secure as the weakest link. Missing a single point significantly degrade the strength of the overall security system. 3.2 Challenges One of the fundamental vulnerability of MANETs comes from open peer-to-peer architecture. In case of wired networks there are dedicated routers but in case of mobile ad hoc network each mobile node acts as a router in order to forward packets for one node to other node. In mobile ad hoc networks there are no boundaries of wireless channel; it is accessible to both network users as well as to malicious attackers. Due to this reason there is no clear line of defense in MANET networks with respect to security design perspective. The boundary becomes

viruses,

application abuses, worms, as well as

through

data

In this layer we mainly concern with the protection of wireless MAC protocol and also provide link-layer security.

Physical Layer

In this layer we should prevent signal jamming as well as denial-of-service attacks.

The wireless medium as compared to wire line network node mobility more dynamics in mobile ad hoc networks. The network topology is highly dynamic due to free movement in the network like nodes can frequently join or leave, as well as in the network by their own will. There are also interferences in the wireless channel due to this way error, exhibiting volatile characteristics in terms of bandwidth and delay occurs. Due to such dynamic behaviors mobile users request for security services at any anytime or anywhere whenever they move from one place to another in the network.

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
TABLE II

3.3 Routing protocol description There are basically there kind of routing protocols which are: Table driven routing protocols: In these routing protocols each node in the network maintains the complete routing information of the network by occasionally updating the routing table, so when a node needs to send some data or information, so there is no any kind of delay for discovering the route in the whole network. This type of routing protocols approximately works the same way as the wired network routing protocol works. The table driven protocols are DSDV and WRP. On-Demand routing protocols While in this kind of routing protocols, a node simply maintains routes information to get destination that it needs to send required data packets. The routes to get their desire destinations will expire automatically after some time of idleness, while the network is not being used. These routing protocols are AODV, DSR and TORA. Hybrid routing protocols (ZRP) In this type of routing protocol is the combination of the above two categories. In which nodes belonging to a particular geographical area or within a certain detachment from an anxious node are said to be in routing area and uses table driven routing protocol. Communication between nodes in different areas will rely on the source initiated or on-demand routing protocols. This routing protocol Include ZRP. We select the most popular routing protocols, which is On-Demand routing protocols according the these routing protocols they are used when they are need and also in this routing protocols a node simply maintains routes information to get destination that it needs to send required data packets. The routes to get their desire destinations will expire automatically after some time of idleness, while the network is not being used, which give less load on the network and thats why its very hard to attack on such routing protocols. 3.3.1 AODV AODV using a classical distance vector routing algorithm. It is also shares DSRs on-demand discovers routes. During repairing link breakages AODV use to provide loop free routes. It does not add any overhead to the packets, whenever a route is available from source to destination. Due to this way it reduces the effects of stale routes and also need for route maintenance for unused routes. One of the best features of AODV is to provide broadcast, unicast, and multicast communication. During

LISTS SOME COMPARISONS BETWEEN THE THREE ROUTING PROTOCOLS DISCUSSED ABOVE.

Parameters Source Routing Topology Update Information Method

AODR No

DSR Yes

TORA No

Full Route error

Full Route error

Reduced Nodes Height

Unicast, Broadcast

Unicast, Broadcast

Broadcast

Update Destination

Source, Neighbors.

Source

Neighbors

route discovery algorithm AODV uses a broadcast and for reply it uses unicast. 3.3.2 DSR The DSR is an on-demand routing protocol that is based on source routing. It uses no periodic routing messages like AODV, and due to this way it reduces network bandwidth overhead, and also avoids large routing updates as well as it also reduces conserves battery power. In order to identify link layer failure DSR needs support from the MAC layer. It is consist of the two network processes, Route Discovery and Route Maintenance. Both of neither AODV nor DSR guarantees shortest path. 3.3.3.TORA The TORA is an adaptive, scalable and efficient distributed routing algorithm. It is mainly designed for multi-hop wireless networks as well as highly dynamic mobile environment. It is also called source-initiated on-demand routing protocol. It is also use to find multiple routes from source to destination node. One of the main features is that the control messages are localized to a very small set of nodes near the occurrence of a topological change. It has three basic functions: Route maintenance, Route erasure and Route creation. 4.VULNERABILITIES OF THE MOBILE AD HOC NETWORKS Because mobile ad hoc networks have far more vulnerabilities than the traditional wired networks, security is much more difficult to maintain in the mobile ad hoc network than in the wired network. In this section, we discuss the various vulnerabilities that exist in the mobile ad hoc networks.

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 4.1. Lack of Secure Boundaries The meaning of this vulnerability is self-evident: there is not such a clear secure boundary in the mobile ad hoc network, which can be compared with the clear line of defense in the traditional wired network. This vulnerability originates from the nature of the mobile ad hoc network: freedom to join, leave and move inside the network. In the wired network, adversaries must get physical access to the network medium, or even pass through several lines of defense such as firewall and gateway before they can perform malicious behavior to the targets [6]. However, in the mobile ad hoc network, there is no need for an adversary to gain the physical access to visit the network: once the adversary is in the radio range of any other nodes in the mobile ad hoc network, it can communicate with those nodes in its radio range and thus join the network automatically. As a result, the mobile adhoc network does not provide the so-called secure boundary to protect the network from some potentially dangerous network accesses. Lack of secure boundaries makes the mobile ad hoc network susceptible to the attacks. The mobile ad hoc network suffers from all-weather attacks, which can come from any node that is in the radio range of any node in the network, at any time, and target to any other node(s) in the network. To make matters worse, there are various link attacks that can jeopardize the mobile ad hoc network, which make it even harder for the nodes in the network to resist the attacks. The attacks mainly include passive eavesdropping, active interfering, leakage of secret information, data tampering, message replay, message contamination, and denial of service [8]. 4.2. Threats from Compromised nodes Inside the Network In the previous subsection, we mainly discuss the vulnerability that there is no clear secure boundaries in the mobile ad hoc network, which may cause the occurrences of various link attacks. These link attacks place their emphasis on the links between the nodes, and try to perform some malicious behaviors to make destruction to the links. However, there are some other attacks that aim to gain the control over the nodes themselves by some unrighteous means and then use the compromised nodes to execute further malicious actions. This vulnerability can be viewed as the threats that come from the compromised nodes inside the network. Since mobile nodes are autonomous units that can join or leave the network with freedom, it is hard for the nodes themselves to work out some effective policies to prevent the possible malicious behaviors from all the nodes it communicate with because of the behavioral diversity of different nodes. Furthermore, because of the mobility of the ad hoc network, a compromised node can frequently change its attack target and perform malicious behavior to different node in the network, thus it is very difficult to track the malicious behavior performed by a compromised node especially in a large scale ad hoc network. Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network, and these attacks are much harder to detect because they come from the compromised nodes, which behave well before they are compromised. A good example of this kind of threats comes from the potential Byzantine failures encountered in the routing protocol for the mobile ad hoc network [8]. We call it a Byzantine failure when a set of nodes are compromised in such a way that the incorrect and malicious behavior cannot be directly detected because of the cooperation among these compromised nodes when they perform malicious behaviors. The compromised nodes may seemingly behave well; however, they may actually make use of the flaws and inconsistencies in the routing protocol to undetectably destroy the routing fabric of the network, generate and advertise new routing information that contains nonexistent link, provide fake link state information, or even flood other nodes with routing traffic. Because the compromised nodes cannot be easily recognized, their malicious behaviors are prone to be ignored by other nodes. Therefore Byzantine failure is very harmful to the mobile ad hoc network. From above we find that the threats from compromised nodes inside the ad hoc network should be paid more attention, and mobile nodes and infrastructure should not easily trust any node in the network even if it behaves well before because it might have been compromised. 4.3. Lack of Centralized Management Facility Ad hoc networks do not have a centralized piece of management machinery such as a name server, which lead to some vulnerable problems. Now let us discuss this problem in a more detailed manner. First of all, the absence of centralized management machinery makes the detection of attacks a very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large scale ad hoc network [9]. It is rather common in the ad hoc network that benign failures, such as path breakages, transmission impairments and packet dropping, happen frequently. Therefore, malicious failures will be more difficult to detect, especially when

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < adversaries change their attack pattern and their attack target in different periods of time. For each of the victims, because it can only observe the failure that occurs in itself, this short-time observation cannot produce a convincing conclusion that the failure is caused by an adversary. However, we can easily find from a system point of view that the adversary has performed such a large amount of misbehaviors that we can safely conclude that all of the failures caused by this adversary should be malicious failure instead of benign failure, though these failures occur in different nodes at different time. From this example we find that lack of centralized management machinery will cause severe problems when we try to detect the attacks in the ad hoc network. Second, lack of centralized management machinery will impede the trust management for the nodes in the ad hoc network [8]. In mobile ad hoc network, all the nodes are required to cooperate in the network operation, while no security association (SA ) can be assumed for all the network nodes. Thus, it is not practical to perform an a priori classification, and as a result, the usual practice of establishing a line of defense, which distinguishes nodes as trusted and nontrusted, cannot be achieved here in the mobile ad hoc network. Third, some algorithms in the mobile ad hoc network rely on the cooperative participation of all nodes and the infrastructure. Because there is no centralized authority, and decision- making in mobile ad hoc network is sometimes decentralized, the adversary can make use of this vulnerability and perform some attacks that can break the cooperative algorithm [7]. In one word, the absence of centralized management machinery will cause vulnerability that can influence several aspects of operations in the mobile ad hoc network. Thus we should work out some solutions to deal with this problem, which might be discussed in the later section. 4.4. Restricted Power Supply As we all know, due to the mobility of nodes in the ad hoc network, it is common that the nodes in the ad hoc network will reply on battery as their power supply method. While nodes in the wired network do not need to consider the power supply problem because they can get electric power supply from the outlets, which generally mean that their power supply should be approximately infinite; the nodes in the mobile ad hoc network need to consider the restricted battery power, which will cause several problems.
2

The first problem that may be caused by the restricted power supply is denial-of-service attacks [8]. Since the adversary knows that the target node is battery-restricted, either it can continuously send additional packets to the target and ask it routing those additional packets, or it can induce the target to be trapped in some kind of time-consuming computations. In this way, the battery power of the target node will be exhausted by these meaningless tasks, and thus the target node will be out of service to all the benign service requests since it has run out of power. 4.5. Scalability Finally, we need to address the scalability problem when we discuss the vulnerabilities in the mobile ad hoc network [8]. Unlike the traditional wired network in that its scale is generally predefined when it is designed and will not change much during the use, the scale of the ad hoc network keeps changing all the time: because of the mobility of the nodes in the mobile ad hoc network, you can hardly predict how many nodes there will be in the network in the future. As a result, the protocols and services that are applied to the ad hoc network such as routing protocol and key management service should be compatible to the continuously changing scale of the ad hoc network, which may range from decades of nodes to hundreds of nodes, or even thousands of nodes. In other words, these protocols and services need to scale up and down efficiently. 3. Security Solutions to the Mobile Ad Hoc Networks 3.1. Security Criteria We have discussed several routing techniques that potentially make the mobile ad hoc networks in secure in the previous section. However, it is far from our ultimate goal to secure the mobile ad hoc network if we merely know the existing vulnerabilities in it. As a result, we need to find some security solutions to the mobile ad hoc network. In this section, we survey some security schemes that can be useful to protect the mobile ad hoc network from malicious behaviors. 3.1.1 Availability Ensures that the intended network security services listed above are available to the intended parties when required. The availability is typically ensured by redundancy, physical protection and other non-cryptographic means, e.g. use of robust protocols. 3.1.2 Integrity Ensures that the data has not been altered during transmission. The integrity service can be provided using cryptographic hash functions along with some form of encryption. When dealing with network security the integrity

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < service is often provided implicitly by the authentication service. 3.1.3 Confidentiality Confidentiality means that certain information is only accessible to those who have been authorized to access it. In other words, in order to maintain the confidentiality of some confidential information, we need to keep them secret from all entities that do not have the privilege to access them. 3.1.4. Authenticity Both sender and receiver of data need to be sure of each others identity. Authentication can be provided using encryption along with cryptographic hash functions, digital signatures and certificates. Details of the construction and operation of digital signatures can be found in RFC2560. 3.1.5. Nonrepudiation Ensures that parties can prove the transmission or reception of information by another party, i.e. a party cannot falsely deny having received or sent certain data. Non-repudiation requires the use of public key cryptography to provide digital signatures. A trusted third party is required to provide a digital signature. 3.1.6. Authorization Authorization is a process in which an entity is issued a credential, which specifies the privileges and permissions it has and cannot be falsified, by the certificate authority. Authorization is generally used to assign different access rights to different level of users. For instance, we need to ensure that network management function is only accessible by the network administrator. Therefore there should be an authorization process before the network administrator accesses the network management functions. 3.1.7. Anonymity Anonymity means that all the information that can be used to identify the owner or the current user of the node should default be kept private and not be distributed by the node itself or the system software. This criterion is closely related to privacy preserving, in which we should try to protect the privacy of the nodes from arbitrary disclosure to any other entities. 3.2. Attack Types in Mobile Ad Hoc Networks There are numerous kinds of attacks in the mobile ad hoc network, almost all of which can be classified as the following two types [7]: (i). External attacks, in which the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services.

(ii). Internal attacks, in which the adversary wants to gain the normal access to the network and participate the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. 3.2.1. Denial of Service (DoS) This active attack aims at obstructing or limiting access to a certain resource. This resource could be a specific node or service or the whole network. This will affect the availability security service mentioned above. The nature of ad-hoc networks where several routes exist between nodes and routes are very dynamic gives ad-hoc a built-in resistance to DoS attacks, compared to fixed networks. Security mechanisms for wireless ad-hoc networks should aim to provide all the security services listed above and prevent any of the attacks mentioned. However, due to the lack of infrastructure in an ad-hoc wireless network, typical wired-network implementations of the methods mentioned above may not be possible. Along with the general issues listed above, there are also other specific key issues and challenges for providing security in ad-hoc. 3.2.2. Impersonation Here the attacker uses the identity of another node to gain unauthorized access to a resource or data. This attack is often used as a prerequisite to eavesdropping. By impersonating a legitimate node the attacker can try to gain access to the encryption key used to protect the transmitted data. Once the attacker knows this key, she can successfully perform the eavesdropping attack. 3.2.3. Eavesdropping This attack is used to gain knowledge of the transmitted data. This is a passive attack, which is easily performed, in many networking environments. However using an encryption scheme to protect the transmitted data can prevent this attack. 3.2.4 Modiication This attack modifies data during the transmission between the communicating nodes, implying that the communicating nodes do not share the same view of the transmitted data. An example could be when the transmitted data represents a financial transaction where the attacker has modified the transactions value. 3.2.5. Attacks Against Routing The routing within ad hoc networks is more vulnerable to attack as each device itself acts as a router. An attacker can pose as a member node and incorrectly route packets to achieve an attack. Denials of service attacks are particularly easy doing this. Thus implementation of secure routing protocol is one of the challenges within ad hoc network. The use of IPSec to provide authentication, confidentiality and integrity is discussed in this report. By securing all IP traffic (or whatever network layer protocol is used), you are also securing outing.

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <

3.2.6 Key Management General network security implementation of keys involves a trusted authority. Given the lack of infrastructure in ad-hoc, it is generally not possible to have a fixed trusted authority. An alternative to this is required. Security mechanisms will now be outlined for the 802.11 protocols and the Bluetooth protocol. 3.2.7 Link Level Security In wireless environment the links are susceptible to attacks where eavesdropper can intercept data packets. Physical barriers such as walls\rooms\&c. provide no barrier to wireless radio packets. 3.3. Security Schemes in the Mobile Ad Hoc Networks 3.3.1. Intrusion Detection Techniques Intrusion detection system is a complete security solution which provides information about malicious activities in the network, it also uses to detect and report about malicious activities. MANET is also design for route traffic mechanism when there is congestion in the network, faulty nodes as well as topology changes due to its dynamic behavior. IDS use to detect critical nodes and then analyze its data traffic, critical node also degrade network performance.[11] There are different IDS systems which has some specific features, some of them are given blow Cluster based voting Neighbor-monitoring Trust building MANET is a self organized wireless network, due to the fact it has vulnerable attacks that can easily damage the whole network; thats why there should be some solutions which works even some of the mobile nodes compromised in the network. One of the primary challenges of secure routing is to provide authentication (trustworthiness) of users in the network. In case of distributed communication environment in MANET, authentication is open and any un-authentic node may be use to compromise routing traffic in order to disrupt the communication. There are some of the major responsibilities of secure routing which are given below. It provides assurance that modified and replayed route replies should be rejected in order to avoid fabrication of attacks. Routing protocol responsiveness itself provide safety among different routing attacks. In section [12] there is detail description of secure routing mechanism and in our simulation we also worked on the authentication mechanism in MANET.

3.3.3 Secure Multicasting Multicast is a mechanism where any user become the part of multicast group and even send traffic to the multicast users as well as receive traffic, but due to this procedure it can easily fall into denial of service attacks (DoS). There is an architecture usually used to secure multicast traffic that is DIPLOMA. DIPLOMA stands for DIstributed Policy enfOrceMent Architecture which is use to protect or secure end user services as well as network bandwidth. Audio and video traffic usually fall into the category of multicast traffic which is usually use by militaries as well as disaster backup plans (teams). There are some of the major responsibilities of DIPLOMA architecture which are given below [13]. It gives solution for both sender and receiver whenever they access to the multicast group. It also used to limit the bandwidth. DIPLOMA integrates with common multicasting routing protocols like PIM-SM and ODMRP. It also uses to provide (allocate) network resources in a fair manner during attacks. 3.3.4 Privacy-aware and Position based Routing MANET is a kind of wireless network in which mobile nodes move from one station to another. In this type of network environment routing process among different nodes is important thats why privacy-aware and position based routing is used to avoid route overhead. In case of position based routing mechanism, a mobile node within the MANET network broadcast its position co-ordinates as well as its one-hop neighbors. This information can easily be attacked, so therefore privacy-aware mechanism is together with position based routing in order to provide secure communication. PPBR stands for privacy aware and position based routing in which a mobile node mainly takes pseudo identifiers that are usually dynamic and it is also use to provide end-to-end inconspicuousness to other nodes. 3.3.5 Multi-layer Intrusion detection technique Multi-layer intrusion detection technique is a technique in which an attacker attacks at multiple layers in order to stay below the detection threshold so that they will escape easily whenever a single layer impropriety detects. These type of attacks mainly attack at cross layer which are more alarming and frightening as compare to single layer attack and they can easily be escaped. Although these type of attacks can be detected by a multiple layer insubordination detector, where with respect to all network layers input are use to combine and examine by the cross-layer detector in a detailed fashion. There is also another way to detect these kinds of attacks by working together with RTS/CTS and network layer detection with respect to dropped packets.

> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 3.3.6 Key management Certified Authority (CA) is one of the mechanism which provide key management; if it is compromised then entire network can easily be damaged. One of the major functionality of key management and distribution for MANET, it provide solutions for mobility related issues. In section [14] writers discuss different aspect of key management and distribution for MANET. In the paper, the approach for key management use to solve high mobility issue as well as it provide an efficient method to reduce control overhead also gives an idea how to increase reliability in key management with respect to conventional key management process. 4. Conclusion In this survey paper, we try to inspect the security issues in the mobile ad hoc networks, which may be a main disturbance to the operation of it. Due to the mobility and open media nature, the mobile ad hoc networks are much more prone to all kind of security risks, such as information disclosure, intrusion, or even denial of service. As a result, the security needs in the mobile ad hoc networks are much higher than those in the traditional wired networks. First we introduce the basics of the mobile ad hoc network.We then discuss some typical and dangerous vulnerabilities in the mobile ad hoc networks, most of which are caused by the characteristics of the mobile ad hoc networks such as mobility, constantly changing topology, open media and limited battery power. The existence of these vulnerabilities has made it necessary to find some effective security solutions and protect the mobile ad hoc network from all kinds of security risks. Then we discuss the routing techniques in MANETs Finally we introduce the current security solutions for the mobile ad hoc networks. We start with the discussion on the security criteria in mobile ad hoc network, which acts as a guidance to the security-related research works in this area. Then we talk about the main attack types that threaten the current mobile ad hoc networks. In the end, we discuss several security techniques that can help protect the mobile ad hoc networks from external and internal security threats. During the survey, we also find some points that can be further explored in the future, such as some aspects of the intrusion detection techniques can get further improved. We will try to explore deeper in this research area. Refferences: [1] http://isoc.nl/activ/2002-IETF-MANET-explanation.htm

[2] H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, Security in mobile ad hoc networks: Challenges and solutions (2004). IEEE Wireless Communications. 11 (1), pp. 38-47. [3] D. Djenouri, L. Khelladi and A.N. Badache. A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, Communications Surveys & Tutorials, IEEE, Vol. 7, Issue 4, pp. 2--28, Fourth Quarter 2005. [4] Yih-Chun Hu , Adrian Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security and Privacy, v.2 n.3, p.28-39, May 2004 [5]. Shuyao Yu, Youkun Zhang, Chuck Song, and Kai Chen. A security architecture for mobile ad-hoc network. [6]. B. Schneier, Secret and Lies, Digital Security in a Networked World, Wiley, 2000. [7] Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book AdHoc Networks Technologies and Protocols (Chapter 9), Springer, 2005. [8] Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003. [9] Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003. [10]. M. Alicherry and A.D. Keromytis, "Securing MANET Multicast Using DIPLOMA", in Proc. IWSEC, 2010, pp.232-250. [11] Karygiannis, A.; Antonakakis, E.; Apostolopoulos, A.; , "Detecting critical nodes for MANET intrusion detection systems," Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on , vol., no., pp.9 pp.-15, 29-29 June 2006 doi: 10.1109/SECPERU.2006.8 [12] Panagiotis, Papadimitratos; Zygmunt, J. Haas;,"Secure Routing for Mobile Ad hoc Networks," SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002 [13] N. Borisov, I. Goldberg, and D. Wagner, Intercepting Mobile Communications: The Insecurity of 802.11, ACM MOBICOM, 2001. [14] ]. Biswas, J.; Nandy, S.K.; , "Efficient Key Management and Distribution for MANET," Communications, 2006. ICC '06. IEEE International Conference on , vol.5, no., pp.2256- 2261, June 2006 doi: 10.1109/ICC.2006.255106
.

You might also like