CFP last date
02 October 2023
Call for Paper
November Edition
CAE solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 02 October 2023

Reseach Article

A Survey on Security Attacks/Defenses in Mobile Ad-hoc Networks

by Ola H. Younis, Salah E. Essa, Ayman EL-Sayed
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 10
Year of Publication: 2017
Authors: Ola H. Younis, Salah E. Essa, Ayman EL-Sayed

Ola H. Younis, Salah E. Essa, Ayman EL-Sayed . A Survey on Security Attacks/Defenses in Mobile Ad-hoc Networks. Communications on Applied Electronics. 6, 10 ( Apr 2017), 1-9. DOI=10.5120/cae2017652564

@article{ 10.5120/cae2017652564,
author = { Ola H. Younis, Salah E. Essa, Ayman EL-Sayed },
title = { A Survey on Security Attacks/Defenses in Mobile Ad-hoc Networks },
journal = { Communications on Applied Electronics },
issue_date = { Apr 2017 },
volume = { 6 },
number = { 10 },
month = { Apr },
year = { 2017 },
issn = { 2394-4714 },
pages = { 1-9 },
numpages = {9},
url = { http://localhost:9000/archives/volume6/number10/724-2017652564/ },
doi = { 10.5120/cae2017652564 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T19:56:30.821959+05:30
%A Ola H. Younis
%A Salah E. Essa
%A Ayman EL-Sayed
%T A Survey on Security Attacks/Defenses in Mobile Ad-hoc Networks
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 10
%P 1-9
%D 2017
%I Foundation of Computer Science (FCS), NY, USA

Security In mobile ad-hoc network (MANET) is a testing issue because of its unfastened characteristics, the feature of infrastructure less and nodes versatility. In outlining another security system for versatile Ad-hoc networks, one must consider the assaults varieties and in addition the qualities of the assaults that could be propelled facing the Ad-hoc networks and existing identification and moderation schemes. The analysis of these perspectives are outlined in this paper. A variety of attacks have been analyzed in Ad-hoc networks and also the proposed defenses against them. A short prologue to the sorts of assaults and conceivable counter measures to forestall or beat the assaults will be presented.

  1. Jain, S., & Hemrajani, N. 2013. Detection and mitigation techniques of black hole attack in MANET: An Overview. International Journal of Science and Research (IJSR), India Online ISSN, 2319-7064. ‏
  2. Venna, S. R., & Inampudi, R. B. 2016. A Survey on Security Attacks in Wireless Sensor Network. Int. J. Comput. Sci. Inf. Technol.
  3. Paramesvaran, R. D., & Maheswari, D. 2016. Study of Various Security Attacks in Network Layer and the Mitigation Techniques for MANET. Int. J. Adv. Res. Comput. Commun. Eng.
  4. Agrawal, N., Joshi, K. K., & Joshi, N. 2015. Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet. International Journal of Computer Applications, 130(6), 6-11.
  5. Goyal, P., Parmar, V., & Rishi, R. 2011. Manet: vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management, 11(2011), 32-37.‏
  6. Singh, K., & Yadav, R. S. 2007. A review paper on ad hoc network security. International journal of computer science and security, 1(1), 52. ‏
  7. Singh, T., Singh, J., & Sharma, S. 2016. Survey of secure routing protocols in MANET. International Journal of Mobile Network Design and Innovation, 6(3), 142-155.
  8. Jadye, S. (2016). Survey of MANET Attacks, Security Concerns and Measures. (IJCSIT) International Journal of Computer Science and Information Technologies, 7 (2), 1014-1017.
  9. Dorri, A., Kamel, S. R., & Kheirkhah, E. 2015. Security challenges in mobile ad hoc networks: A survey. arXiv preprint arXiv:1503.03233.
  10. Garg, A., & Beniwal, V. 2012. A review on security issues of routing protocols in mobile ad-hoc networks. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9).
  11. Kour, P., & Panwar, L. C. 2014. A Review on Security Challenges and Attacks in Wireless Sensor Networks. International Journal of Science and Research, 3(5), 1360-1364.
  12. Stallings, W. 2009. Wireless communications & networks. Pearson Education India.
  13. Yi, S., & Kravets, R. 2004. Composite Key Management for Ad Hoc Networks. In MobiQuitous (Vol. 4, pp. 52-61).
  14. Oppliger, R. 2001. Internet and intranet security. Artech House.
  15. Ghaffari, A. 2006. Vulnerability and security of mobile ad hoc networks. In Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization (pp. 124-129). World Scientific and Engineering Academy and Society (WSEAS).
  16. Shen, H., & Li, Z. 2008. ARM: An account-based hierarchical reputation management system for wireless ad hoc networks. In Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on (pp. 370-375). IEEE.
  17. Cardenas, A. A., Benammar, N., Papageorgiou, G., & Baras, J. S. 2004. Cross-layered security analysis of wireless ad hoc networks. Maryland Univ College Park Dept Of Electrical And Computer Engineering.
  18. Menaria, S., Valiveti, S., & Kotecha, K. 2010. Comparative study of distributed intrusion detection in ad-hoc networks. International Journal of Computer Applications, 8(9), 11-16.
  19. Anjum, F., & Mouchtaris, P. 2007. Security for wireless ad hoc networks. John Wiley & Sons.
  20. Purohit, N., Sinha, R., & Maurya, K. 2011. Simulation study of Black hole and Jellyfish attack on MANET using NS3. In Engineering (NUiCONE), 2011 Nirma University International Conference on (pp. 1-5). IEEE.
  21. Liu, Z., Joy, A. W., & Thompson, R. A. 2004. A dynamic trust model for mobile ad hoc networks. In Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of (pp. 80-85). IEEE.
  22. Bhalaji, N., Sivaramkrishnan, A. R., Banerjee, S., Sundar, V., & Shanmugam, A. 2009. Trust enhanced dynamic source routing protocol for adhoc networks. World Academy of Science, Engineering and Technology, 49, 1074-1079.
  23. Buchegger, S., & Le Boudec, J. Y. 2002. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (pp. 226-236). ACM.
  24. Jakobsson, M., Wetzel, S., & Yener, B. 2003. Stealth attacks on ad-hoc wireless networks. In Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th (Vol. 3, pp. 2103-2111). IEEE.
  25. Wu, B., Chen, J., Wu, J., & Cardei, M. 2007. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless network security (pp. 103-135). Springer US.
  26. Radha, S. 2010. A novel method for detection and elimination of modification attack and TTL attack in NTP based routing algorithm. In Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on (pp. 60-64). IEEE.
  27. Marti, S., Giuli, T. J., Lai, K., & Baker, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265). ACM.
  28. Hu, Y. C., Perrig, A., & Johnson, D. B. 2003. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30-40). ACM.
  29. Hu, Y. C., Johnson, D. B., & Perrig, A. 2003. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc networks, 1(1), 175-192.
  30. Nadeem, A., & Howarth, M. P. 2013. A survey of manet intrusion detection & prevention approaches for network layer attacks. IEEE Communications surveys and tutorials, 15(4), 2027-2045.
  31. Ilyas, M. (Ed.). 2002. The handbook of ad hoc wireless networks. CRC press.
  32. Kaur, J., & Nagpal, S. 2014. Review Paper on Security Challenges and Attacks in Mobile Ad-Hoc Networks. International Journal of Advanced Research in Computer Science and Software Engineering, 4(5), 1501-1508.
  33. Zapata, M. G. 2002. Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106-107.
  34. Jadhav, A., & Johnson, E. E. 2006. Secure neighborhood routing protocol. In Military Communications Conference, 2006. MILCOM 2006. IEEE (pp. 1-7). IEEE.
  35. Balamurugan, G., Somasundaram, R., & Sumithra, K. 2014. The Comparative Study of Security Mechanism in Mobile Ad-hoc Networks. IJCSN - Int. J. Comput. Sci. Network.
  36. Abbas, S., Merabti, M., & Llewellyn-Jones, D. 2009. Signal strength based Sybil attack detection in wireless Ad Hoc networks. In Developments in eSystems Engineering (DESE), 2009 Second International Conference on (pp. 190-195). IEEE.
  37. Hashmi, S., & Brooke, J. 2010. Towards sybil resistant authentication in mobile ad hoc networks. In Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on (pp. 17-24). IEEE.
  38. Guette, G., & Ducourthial, B. 2007. On the Sybil attack detection in VANET. In Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE International Conference on (pp. 1-6). IEEE.
  39. Jakobsson, M., & Wetzel, S. 2001. Security weaknesses in Bluetooth. In Cryptographers’ Track at the RSA Conference (pp. 176-191). Springer Berlin Heidelberg.
  40. Ponsam, J. G., & Srinivasan, R. 2014. A survey on MANET security challenges, attacks and its countermeasures. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3(1).
  41. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. 2002. A secure routing protocol for ad hoc networks. In Network Protocols, 2002. Proceedings. 10th IEEE International Conference on (pp. 78-87). IEEE.
  42. Hu, Y. C., Perrig, A., & Johnson, D. B. 2003. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976-1986). IEEE.
  43. Borisov, N., Goldberg, I., & Wagner, D. 2001. Intercepting mobile communications: the insecurity of 802.11. In Proceedings of the 7th annual international conference on Mobile computing and networking (pp. 180-189). ACM.
  44. Zhou, L., & Haas, Z. J. 1999. Securing ad hoc networks. IEEE network, 13(6), 24-30.‏
  45. Nguyen, H. L., & Nguyen, U. T. 2008. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32-46.
  46. Čapkun, S., Buttyán, L., & Hubaux, J. P. 2003. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 21-32). ACM.
  47. Hu, L., & Evans, D. 2004. Using Directional Antennas to Prevent Wormhole Attacks. In NDSS.
  48. Mahajan, N., Bedi, R., & Gupta, S. K. 2014. A Survey on Detection of Byzantine and Resource Consumption Attacks. Journal of Basic and Applied Engineering Research.
  49. Garg, N., & Mahapatra, R. P. 2009. Manet security issues. IJCSNS, 9(8), 241.‏
  50. Guntewar, C., & Sahare, V. 2015. A Review on Byzantine Attack Detection and Prevention Using Game Theory. (IJCSIT) International Journal of Computer Science and Information Technologies.
  51. Ishrat, Z. 2011. Security issues, challenges & solution in MANET. IJCST, 2(4), 108-112.
  52. Boora, S., Kumar, Y., & Kochar, B. 2011. A Survey on Security Issues in Mobile Ad-hoc Networks. IJCSMS International Journal of Computer Science and Management Studies.
  53. Singh, M., & Kaur, G. 2013. A Surveys of Attacks in MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 3(6).
  54. Lalar, S. 2014. Security in MANET: Vulnerabilities, Attacks & Solutions. Intational J. Multidiscip. Curr. Res, 2, 62-69.
  55. Zeng, Q. A., & Agrawal, D. P. 2002. Handbook of wireless networks and mobile computing. Publishers: John Wiley and Sons.
  56. Kaufman, C., Perlman, R., & Speciner, M. 2002. Network security: private communication in a public world. Prentice Hall Press.
  57. Sun, J. Z. 2001. Mobile ad hoc networking: an essential technology for pervasive computing. In Info-tech and Info-net, 2001. Proceedings. ICII 2001-Beijing. 2001 International Conferences on (Vol. 3, pp. 316-321). IEEE.
  58. Gupta, V., Krishnamurthy, S., & Faloutsos, M. 2002. Denial of service attacks at the MAC layer in wireless ad hoc networks. In MILCOM 2002. Proceedings (Vol. 2, pp. 1118-1123). IEEE.
  59. El-Hajj, W., Kountanis, D., Al-Fuqaha, A., & Guizani, M. 2006. A fuzzy-based hierarchical energy efficient routing protocol for large scale mobile ad hoc networks (feer). In Communications, 2006. ICC'06. IEEE International Conference on (Vol. 8, pp. 3585-3590). IEEE.
  60. Achankunju, M., Pushpalakshmi, R., & Kumar, A. V. A. 2013. Particle swarm optimization based secure QoS clustering for mobile ad hoc network. In Communications and Signal Processing (ICCSP), 2013 International Conference on (pp. 315-320). IEEE.
  61. Manisha, & Kumar, M. 2014. Network Layer Attacks and Their Countermeasures in Manet: A Review. IOSR Journal of Computer Engineering (IOSR-JCE).
  62. Kaur, A., & Singh, A. 2014. A Review on Security Attacks in Mobile Ad-hoc Networks. ‏International Journal of Science and Research (IJSR), 3(5).
  63. Ghonge, M. M., Jawandhiya, P. M., & Ali, M. S. 2011. Countermeasures of network layer attacks in manets. IJCA Special Issue on “Network Security and Cryptography” NSC.
  64. Aarti, & Tyagi, S. S. 2013. Study Of Manet: Characteristics, challenges, application and security attacks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5),252-257.‏
Index Terms

Computer Science
Information Sciences


MANET Security attacks blackhole wormhole Challenges.