A Review Paper on Ad Hoc Network Security (original) (raw)
Related papers
Security Challenges In Ad Hoc Networks
Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes.
Security Routing Protocols in Ad Hoc Networks : Challenges and Solutions
2016
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues in Mobile Ad Hoc Networks (MANETs). To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. Then we discuss various proactive and reactive solutions proposed for MANETs. We outline secure routing solutions to avoid some attacks against the routing protocols based on cooperation between nodes. Keywords— Security; Routing Protocols; Ad Hoc Networks; Attacks; Secure Routing Protocols.
Ad hoc network routing and security: A review
International Journal of Communication Systems, 2007
Ad hoc network is a collection of wireless mobile nodes dynamically forming a local area network without the use of any existing network infrastructure or centralized administration. One problem in the design of such network is its wireless vulnerabilities and limited physical security. This paper considers the security attributes and goals of ad hoc network, reviews the latest developments of current routing and security mechanissm including encryption, protocols, user authentication, and physical security. It also explores the new approaches trying to solve current problems and points out the future research directions. These methods will be helpful in the military and other security-sensitive fields.
SECURITY IN AD HOC NETWORK , 2019
Ad Hoc network is an independent system of mobile hosts connected by wireless means. There is no static infrastructure in this network. Devices can join and leave the network unexpectedly. They are allowed to move freely. Each node in this network can serve as a router thus helping to relay packets received from one node to other nodes. The flexibility of the ad hoc network introduces new security challenges. Regardless of the security challenges, there has been a speedy increase in the interest of ad hoc networks in current years, because of mobility support and are very well suitable for many tough situations, such military operation, rescue missions, commercial operations, etc. In this report, I have discussed ad hoc network challenges, security requirements, application of ad hoc network, attacks on ad hoc network, routing protocol of ad hoc network, routing in ad hoc network, and key security issues. KEYWORDS: Ad hoc Network, Attacks, routing protocol, and Security
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
The Ad-Hoc networks include wireless hosts which can be mobile, too. Necessarily, it doesn’t be used any prefabricated structure in these networks. It means that there is no substructure such as central station, router, switch and/or any other things which are used in network structure. There are only several wireless nodes which connect non-neighbour nodes using adjacent nodes. Security in Ad-Hoc networks is of high particular importance. As there are not only a lot of problems in wired networks but also security problems such as easy listening and change the information being transferred, the possibility of identity theft, lack of participation and/or destroying routing operations, inability to use encrypted key distribution infrastructures and so on are available problems. One of the main security problems is providing a secure routing protocol in these networks. In recent years, it has been done considerable effort to provide a secure routing protocol in these networks. So, we in this paper, will discuss about routing protocols which have remarkable effect on Ad-Hoc networks security to recognize security problems in routing Ad-Hoc networks using different kinds of routing protocols such as Flooding, DSR, AODV, ARAN, Ariadne, SAODV and SEAD and determine the best routing protocol in security of case protocol.
Security in Routing Protocol for Ad Hoc Networks
2014
In this paper, we discuss security issues and their current solutions in the ad hoc Networks. Ad hoc networks are a key factor in the evolution of wireless communications. An ad hoc wireless network is a collection of wireless nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Security in ad hoc network is a grand challenge problem now a day. To enhance the security levels in the routing protocol to prevent the network against active and passive attacks without the presence of central authority. A peer review process has been introduced to check the integrity and non-repudiation of the routing packets and key exchange packets. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and nonrepudiation, the ad hoc routing protocols should al...
Security Issues and Challenges (SIC) of Ad-hoc Networking
As the approach of ad hoc networking varies from traditional networking approaches, the security aspects that are valid in the conventional wired networks are not fully applicable in the context of ad hoc networks. While the basic security requirements such as confidentiality and authenticity remain, the ad hoc networking approach restricts the set of applicable security mechanisms to be used since the level of security and the performance are related to each other and must be carefully balanced. The security goals and challenges that the field of ad hoc networking faces are explored in more detail. An overview of the most important active attacks is included. Some of the most important security schemes are presented in order to illustrate common approaches that are currently followed to ensure network security in infrastructure less networks. The protected resourceful Ad hoc Distance vector routing protocol (SEAD)[2] employ the use of hash chains to substantiate hop counts and sequence numbers. SEAD[2] is based on the design of the proactive ad hoc routing protocol DSDV[9]. The final secure routing protocol to be presented is the Secure Routing Protocol (SRP).
Secured Routing for ad hoc Network: A Review
International Journal of Aquatic Science, 2013
An ad hoc Network provides a infrastructure less communication over a shared wireless Channel and operates without the use of existing network in which all mobile nodes can communicate with a centralized structure. This becomes the main reason, for this technology to be more vulnerable to security attack and security threats. Such attack includes passive eavesdropping over the wireless channel, denial of service attack by malicious nodes and attack from promised node or stolen devices. In this paper, we present review on the security issued of existing routing protocols in an adhoc network environment more secure from all type of security threats and some of vulnerable attack. This study will help to Ad hoc network researchers for developing secured routing
In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyze the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the current security solutions for the mobile ad hoc network.
Secure routing for mobile ad hoc networks
IEEE Communications Surveys & Tutorials, 2005
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.