Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks

被引:27
作者
Abdelaziz, Amara Korba [1 ]
Nafaa, Mehdi [1 ]
Salim, Ghanemi [1 ]
机构
[1] Univ Badji Mokhtar, Networks & Syst Lab, Annaba, Algeria
来源
UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013) | 2013年
关键词
Mobile ad hoc networks; security threats; malicious; selfish; countermeasures;
D O I
10.1109/UKSim.2013.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad-hoc Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic ad hoc nature, in which unknown devices develop spontaneous interactions between themselves, these networks are particularly vulnerable to various security threats. In recent years considerable efforts have been made to design secure and robust routing protocol, and many security schemes have been proposed to tackle these security issues. In this paper, we present a comprehensive survey of security threats in MANET. In particular, we examine all routing threats that can target the operation of routing protocol, whether they belong to selfish behaviors or malicious attacks, as well as countermeasures against such attacks. In order to analyze the existent countermeasures in a structured manner we have classified them into three classes; solutions based on cryptography; intrusion detection systems; and trust management and reputation-based solutions.
引用
收藏
页码:693 / 698
页数:6
相关论文
共 27 条
[1]  
[Anonymous], OPTIMIZED L IN PRESS
[2]  
[Anonymous], J AD HOC NETWORKING
[3]  
[Anonymous], 2010, SECURITY SELF ORG NE
[4]  
[Anonymous], 2008, Security in wireless ad hoc and sensor networks
[5]  
[Anonymous], 2012, J NETWORK COMPUTER A, DOI DOI 10.1016/j.jnca.2012.01.019
[6]   SECURE ROUTING FOR MOBILE AD HOC NETWORKS [J].
Argyroudis, Patroklos G. ;
O'Mahony, Donal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03) :2-21
[7]  
Balakrishnan V, 2009, COMPUT COMMUN NETW S, P473, DOI 10.1007/978-1-84800-328-6_19
[8]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[9]  
Deb N, 2011, COMM COM INF SC, V203, P169
[10]   SVM-based intrusion detection system for wireless ad hoc networks [J].
Deng, HM ;
Zeng, QA ;
Agrawal, DP .
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, :2147-2151