Security Issues in Mobile Adhoc Networks: Attacks and their Countermeasures

Kamna Sharma
2017 International Journal for Research in Applied Science and Engineering Technology  
A Mobile ad hoc network (MANET) is a collection of mobile devices where each device participates in routing by forwarding data to other nodes. MANETs can be employed in various situations ranging from emergency operations and disaster relief to military service and task forces, so security is an essential component for protected communication between nodes. In this paper, we provided classification of security attacks in MANET into data, network, application and routing attacks. We further
more » ... ks. We further discussed and compared various countermeasures against these attacks. I. INTRODUCTION TO MANET MANET is a collection of mobile nodes in which nodes communicate with each other through wireless links without relying on any existing infrastructure, centralized access points or base stations [1]. It is a flexible network and is self-configurable which allows network deployment quickly without the need of specified infrastructure. These networks are useful in situations where either infrastructure is not available or installing the infrastructure is is very costly [2]. Application set of MANETs is very divergent. MANETs can be applied in military, voting systems, automated battlefields, rescue systems, mobile offices, electronic payments, and virtual classrooms, other emergency and disastrous situations. The characteristics of MANETs such as absence of trust relationship among nodes, power constraint lack of centralized authority and dynamic topology impose major security issues. The wireless channel is accessible by both legitimate users as well as intruders. It also lacks clear boundary between inside network and outside world. II. SECURITY ISSUES IN MANETS Security is the major concern in MANETS to maintain the security in wireless environment. Adversaries launch different type of attacks to disrupt the whole network by tampering the original messages. So, before we analyze diverse attack categories, we look at how attackers are classified on the basis of their nature and scope to destruct the system as follow [3]: A. Active Attackers These attackers are very harmful for the system because they generate the packets by modifying the actual content of the message and do not forward the acknowledged message. B. Passive Attackers These attackers spy on the wireless medium to gather useful information which may be moved to other attackers but do not engage in the communication process of the network. C. Insider Attackers These attackers are the legitimate users of the network and have the concrete knowledge of the network. They are very dangerous as compared to other attackers because it's simple for them to fire attacks against the network. D. Outsider Attackers These are invaders who have goal to exploit the network but they generate lesser problems as compared to the insider attackers. E. Rational Attackers These attackers launch attacks for the purpose of getting personal benefits.
doi:10.22214/ijraset.2017.8142 fatcat:echbs4kteffupdqxcub6vgys6i