List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
A Review of Current Routing Attacks in Mobile Ad Hoc Networks
Full text
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.28MB)
Volume:  2    Issue:  3
Pages:  1-65
Publication Date:   June 2008
ISSN (Online): 1985-1553
18 - 29
Rashid Hafeez Khokhar - Malaysia
Md Asri Ngadi - Malaysia
Satria Mandala - Malaysia
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   MANET security, Routing protocols, Cryptography, Communications and data security, Shared wireless channel 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. Docstoc
3. Scribd
5. Google Scholar
6. CiteSeerX
7. WorldCat
8. ScientificCommons
9. Bielefeld Academic Search Engine (BASE)
10. ResearchGATE
11. refSeek
12. Academic Index
13. Microsoft Academic Search
14. Socol@r
15. iSEEK
16. Academic Journals Database
17. Libsearch
18. slideshare
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols. 
1 L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks, Princeton Univ. Press, 1962.
2 Th. Clausen et al., “Optimized Link State Routing Protocol,” IETF Internet draft, ietfmanet-11.txt, July 2003
3 C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97, Apr. 1997, pp. 197-21 1.
4 S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
5 C. R. Dow, P. J. Lin, S. C. Chen*, J. H. Lin*, and S. F. Hwang. A Study of Recent Research Trends and Experimental Guidelines in Mobile. Ad-hoc Networks. 19th International Conference on Advanced Information Networking and Applications, 2005. AINA 2005, Volume: 1, On page(s): 72- 77 vol.1.
6 B. Kannhavong et al., “A Collusion Attack Against OLSR-Based Mobile Ad Hoc Networks,” IEEE GLOBECOM ’06.
7 B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
8 S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
9 Z. Karakehayov, “Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
10 Jyoti Raju and J.J. Garcia-Luna-Aceves, “ A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks’,” in Proceeding of IEEE ICC, June 2000.
11 D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
12 IEEE Std. 802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” 1997.
13 Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
14 S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
15 S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th MobiCom, Boston, MA, Aug. 2000.
16 V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. lNFOCOM '97, Apr. 1997.
17 C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Comp. Com- mun. Rev., Oct. 1994, pp. 234-44.
18 C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.
19 C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On demand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003.
20 L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path,” IEEE Wireless Commun. and Networking Conf. ’05.
21 D. Raffo et al., “Securing OLSR Using Node Locations,” Proc. 2005 Euro. Wireless, Nicosia, Cyprus, Apr. 10–13, 2005.
22 K. Sanzgiri et al., “A Secure Routing Protocol for Ad Hoc Networks,” Proc. 2002 IEEE Int’l. Conf. Network Protocols, Nov. 2002.
23 C.K.Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems,” Prentice Hall Publications, 2002.
24 P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks,” Int’l. J. Info. Tech., vol. 11, no. 2, 2005.
25 M. G. Zapata and N. Asokan, “Securing Ad-Hoc Routing Protocols,” Proc. 2002 ACM Wksp. Wireless Sec., Sept. 2002, pp. 1–10.
1 P.K. Sehgal, R. Nath. "A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network". International Journal of Computer Science and Security (IJCSS), 3(1):16-22
2 S. Karthik , V.P.Arunachalam and T.Ravichandran, “A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback”, International Journal of Computer Science and Security (IJCSS), 3(4), pp. 272 – 279, 2009.
3 S. Mohammadi, R. Atani and H. Jadidoleslamy, "A Comparison of Link Layer Attacks on Wireless Sensor Networks," Journal of Information Security, 2 (2), pp. 69-84.
4 Dr. S. Mohammadi and H. Jadidoleslamy, (2011), “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks(GRAPH-HOC), 3(1), pp. 35-56, 2011.
5 R. H. Jhaveri, A. D. Patel, J. D. Parmar and B. I. Shah, “MANET Routing Protocols and Wormhole Attack Against AODV”, International Journal of Computer Science and Network Security, 10 (4), pp. 12-18, 2010.
6 P. K. Sehgal and R. Nath, “A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network”, International Journal of Computer Science and Security (IJCSS), 3 (1), pp. 16-22
7 S. Mohammadi, R. E. Atani and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, 2 (2), pp.69-84, 2011.
8 H. N. Saha, Dr. D. Bhattacharyya and Dr. P. K.Banerjee, “A Novel and Efficient Secured Routing Algorithm in Mobile Ad Hoc Network”, International Journal of Wireless & Mobile Networks (IJWMN), 3(5), pp. 245-264, 2011.
9 F. He, K. Hao and H. Ma, “S-MAODV: A Trust Key Computing Based Secure Multicast Ad-hoc On Demand Vector Routing Protocol”, in Proceedings Computer Science and Information Technology 2010 3rd IEEE International Conference, Chengdu, 9-11 July 2010, pp. 438-438.
10 R. Maulik and N. Chaki, “A Study on Wormhole Attacks in MANET”, International Journal of Computer Information Systems and Industrial Management Application, 3(2011), pp. 271-279, 2011.
11 R. Nath and P. K. Sehgal, “A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network”, International Journal of Computer Science and Security (IJCSS), 3(1), pp. 16 – 22, 2009.
12 S. Tapaswi, Kushwah and V. Singh, “Securing Nodes in MANETs Using Node Based Key Management Scheme”, in Proceedings Advances in Computer Engineering (ACE), 2010 International Conference, Bangalore, Karnataka, India, pp. 228-231, 20-21 June 2010 .
13 A. Sinnreich, N. Graham and A. Trammell, “Weaving a New ‘Net: A Mesh-Based Solution for Democratizing Networked Communications”, The Information Society: An International Journal, 27(5), pp. 336-345, 2011.
14 C. Basuray, D. Giri, S. Chatterjee, S. Ganguly and Prof. H. N. Saha, “Minimized Overhead and Administrator based Secured Routing Protocol”, in Proceedings, 2nd Annual International Conference on Innovative Techno-Management Solutions for Social Sector IEMCON 2012, Science City, Kolkata, India, 17 - 18 January 2011.
15 A. Sinnreich, N. Graham and A. Trammell, “Weaving a New 'Net: A Mesh-Based Solution for Democratizing Networked Communications”, The Information Society: An International Journal 27(5), pp. 336-345, 2011.
16 J.V.S. Jebadurai, A.A.R. Melvin and I.J.R Jebadurai, “Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes”, in Proceedings Electronics Computer Technology (ICECT), 2011 3rd International Conference Kanyakumari, 8-10 April 2011, pp. 321 – 324.
17 K. Pal, Prof. S. Sofat and Prof. D. Bansal, “Comparison of Secure OLSR Routing Protocol”, International Journal of Engineering Science and Technology (IJEST), 3 (6), pp. 5049-5056, 2011.
18 G. S. Mamatha and S. C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS”, International Journal of Computer Science and Security (IJCSS), 4(3), pp. 275 – 284, 2010.
1 TechRepublic
2 Universiti Malaya, Kuala Lumpu
3 Umm Al-Qura University
4 Zdravko Karakehayov
Rashid Hafeez Khokhar : Colleagues
Md Asri Ngadi : Colleagues
Satria Mandala : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.