Security Threats in Mobile Ad Hoc Network

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces…


Chapter One
1.1 Background
1.2 Related Work
1.3 Research Goals
1.4 Guidance to the Work
1.5 Our Work
Chapter Two
Security Services
2.1 Availability
2.2 Confidentiality
2.3 Integrity
2.4 Authentication
2.5 Nonrepudiation
2.6 Scalability
2.7 Summary
Chapter Three
Types of Security Attacks
3.1 Attacks Using Modification
3.2 Attacks Using Impersonation
3.3 Attacks through Fabrication
3.4 Wormhole Attacks
3.5 Lack of Cooperation
3.6 Summary
Chapter Four
Security Threats in Physical Layer
4.1 Eavesdropping
4.2 Interference and Jamming
4.3 Summary
Chapter Five
Security Threats in Link Layer
5.1 Threats in IEEE 802.11 MAC
5.2 Threats in IEEE 802.11 WEP
5.3 Summary
Chapter Six
Security Threats in Network Layer
6.1 Routing Protocols
6.1.2 On-Demand
6.1.3 Other Routing Protocols
6.2 Network Layer Attacks
6.2.1 Routing Table Overflow Attack
6.2.2 Routing Cache Poisoning Attack
6.2.3 Attacks on Particular Protocol
6.2.4 Other Advanced Attacks
6.3 Summary
Chapter Seven
Security Threats in Transport Layer
7.1 SYN Flooding Attack
7.2 Session Hijacking
7.3 TCP ACK Storm
7.4 Summary
Chapter Eight
Security Threats in Application Layer
8.1 Malicious Code Attacks
8.2 Repudiation Attacks
8.3 Summary
Chapter Nine
9.1 Countermeasures on Physical Layer Attacks
9.2 Countermeasures on Link Layer Attacks
9.3 Countermeasures on Network Layer Attacks…

Source: Blekinge Institute of Technology

Download URL 2: Visit Now

Leave a Comment