Network Layer Attacks Mechanisms in MANETS-A Survey

Inam Ullah Khan, Muhammad AbulHassan

Abstract


The security issue in versatile adhoc networks is to shield the network layer from noxious assaults, subsequently recognizing and avoiding malevolent hubs. A brought together security is in particularly requirement for such networks to ensure both course and information sending operations in the network layer. The noxious hubs in the network can promptly act to work as switches. This will exclusively aggravate the network operation from right conveying of the bundles, similar to the vindictive hubs can give stale directing upgrades or drop every one of the parcels going through them. This paper also focuses on different security aspects of network layer and discusses the effects of the attacks in detail through a survey approaches used for security purposes.


References


. Y. Xiao, X. Shen, and D.-Z. Du (Eds.), “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY, 2006 Springer

. C. Perkins, Ad Hoc Networks, Addison-Wesley, 2001.

. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, pp. 38-47, 2004.

. M. Zapata, Secure Ad Hoc On-Demand Distance Vector (SAODV). Internet draft, draft-guerrero-manet-saodv-01.txt, 2002.

. Y. Hu, A. Perrig, and D. Johnson, Ariadne: A Secure On- Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta, 2002.

. Y. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, pp. 28-39, 2004.

. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of theACM Workshop on Wireless Security, pp. 21-30, 2002.

. Y. Hu, APerrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks inWireless Ad Hoc Networks. Proc. of IEEE INFORCOM, 2002.

. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding- Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002.

. Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 1-8). IEEE.

. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp. 1-5). IEEE.

. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE.

. Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647-650). IEEE.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol” Computer Networks, Vol. 74, PP-92-102, 2014.

. Khan, S., & Khan, F. (2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. In 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8).

. Khan, F., Jan, S. R., Tahir, M., Khan, S., &Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.

. Khan, F., & Nakagawa, K. (2012). Performance Improvement in Cognitive Radio Sensor Networks. the IEICE Japan.

. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network” in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

. Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.

. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.

. Khan, S., Khan, F., Arif, F., Q., Jan, M. A., & Khan, S. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. Journal of Applied Environmental and Biological Sciences, 6(4S), 191-200.

. Khan, F., & Nakagawa, K. (2012). B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks. 電子情報通信学会ソサイエティ大会講演論文集, 2012(2), 152.

. Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication networks. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.

. Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., &Ullah, F. (2016). A Survey: Embedded Networks Supporting By Different Operating Networks. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

. Jan, S. R., Ullah, F., Ali, H., & Khan, F. (2016). Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

. Jan, S. R., Khan, F., &Zaman, A. The perception of students about mobile learning at University level.

. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A Sybil Attack Detection Scheme for a Forest Wildfire Monitoring Application,” Elsevier Future Generation Computer Networks (FGCS), “Accepted”, 2016.

. Jan, S. R., Shah, S. T. U., Johar, Z. U., Shah, Y., & Khan, F. (2016). An Innovative Approach to Investigate Various Software Testing Techniques and Strategies. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.

. Khan, I. A., Safdar, M., Ullah, F., Jan, S. R., Khan, F., & Shah, S. (2016). Request-Response Interaction Model in Constrained Networks. In International Journal of Advance Research and Innovative Ideas in Education, Online ISSN-2395-4396

. Azeem, N., Ahmad, I., Jan, S. R., Tahir, M., Ullah, F., & Khan, F. (2016). A New Robust Video Watermarking Technique Using H. 264/AAC Codec Luma Components Based On DCT. In International Journal of Advance Research and Innovative Ideas in Education, Online ISSN-2395-4396

. Jan, S. R., Khan, F., Ullah, F., Azim, N., &Tahir, M. (2016). Using CoAP Protocol for Resource Observation in IoT. International Journal of Emerging Technology in Computer Science & Electronics, ISSN: 0976-1353

. Azim, N., Majid, A., Khan, F., Jan, S. R., Tahir, M., &Jabeen, Q. (2016). People Factors in Agile Software Development and Project Management. In International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353

. Azim, N., Majid, A., Khan, F., Tahir, M., Safdar, M., &Jabeen, Q. (2016). Routing of Mobile Hosts in Adhoc Networks. In International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353.

. Azim, N., Khan, A., Khan, F., Majid, A., Jan, S. R., &Tahir, M. (2016) Offsite 2-Way Data Replication toward Improving Data Refresh Performance. In International Journal of Engineering Trends and Applications, ISSN: 2393 – 9516

. Tahir, M., Khan, F., Jan, S. R., Azim, N., Khan, I. A., &Ullah, F. (2016) EEC: Evaluation of Energy Consumption in Wireless Sensor Networks. . In International Journal of Engineering Trends and Applications, ISSN: 2393 – 9516

. M. A. Jan, P. Nanda, M. Usman, and X. He, “PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks,” Concurrency and Computation: Practice and Experience, “accepted”, 2016.

. Azim, N., Qureshi, Y., Khan, F., Tahir, M., Jan, S. R., &Majid, A. (2016) Offsite One Way Data Replication towards Improving Data Refresh Performance. In International Journal of Computer Science Trends and Technology, ISSN: 2347-8578

. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S. R. (2016) Comparative Study of Routing Protocols in Mobile Adhoc Networks. In International Journal of Computer Science Trends and Technology, ISSN: 2347-8578

. Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., (2016) Framework for Better Reusability in Component Based Software Engineering.In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81.

. Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67

. Jan, S.R., Ullah, F., Khan, F., Azim, N., Tahir, M., Khan, S., Safdar, M. (2016). Applications and Challenges Faced by Internet of Things- A Survey. In the International Journal of Engineering Trends and Applications,ISSN: 2393 – 9516

. Tahir, M., Khan, F., Jan, S.R., Khan, I.A., Azim, N. (2016). Inter-Relationship between Energy Efficient Routing and Secure Communication in WSN. In International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2012, All rights reserved.| ijrcct.org

Creative Commons License
International Journal of Research in Computer and Communication Technology Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJRCCT , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.