Security Threats in Mobile Ad Hoc Network

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.


Chapter One
1.1 Background
1.2 Related Work
1.3 Research Goals
1.4 Guidance to the Work
1.5 Our Work
Chapter Two
Security Services
2.1 Availability
2.2 Confidentiality
2.3 Integrity
2.4 Authentication
2.5 Nonrepudiation
2.6 Scalability
2.7 Summary
Chapter Three
Types of Security Attacks
3.1 Attacks Using Modification
3.2 Attacks Using Impersonation
3.3 Attacks through Fabrication
3.4 Wormhole Attacks
3.5 Lack of Cooperation
3.6 Summary
Chapter Four
Security Threats in Physical Layer
4.1 Eavesdropping
4.2 Interference and Jamming
4.3 Summary
Chapter Five
Security Threats in Link Layer
5.1 Threats in IEEE 802.11 MAC
5.2 Threats in IEEE 802.11 WEP
5.3 Summary
Chapter Six
Security Threats in Network Layer
6.1 Routing Protocols
6.1.2 On-Demand
6.1.3 Other Routing Protocols
6.2 Network Layer Attacks
6.2.1 Routing Table Overflow Attack
6.2.2 Routing Cache Poisoning Attack
6.2.3 Attacks on Particular Protocol
6.2.4 Other Advanced Attacks
6.3 Summary
Chapter Seven
Security Threats in Transport Layer
7.1 SYN Flooding Attack
7.2 Session Hijacking
7.3 TCP ACK Storm
7.4 Summary
Chapter Eight
Security Threats in Application Layer
8.1 Malicious Code Attacks
8.2 Repudiation Attacks
8.3 Summary
Chapter Nine
9.1 Countermeasures on Physical Layer Attacks
9.2 Countermeasures on Link Layer Attacks
9.3 Countermeasures on Network Layer Attacks
9.4 Countermeasures on Transport Layer Attacks
9.5 Countermeasures on Application Layer Attacks
9.6 Summary
Chapter Ten
10.1 Future Directions

Author: Kamanashis Biswas, Md. Liakat Ali

Source: Blekinge Institute of Technology

Reference URL 1: Visit Now

Leave a Comment