logo

Security Issues, Challenges and Solutions of MANET

   

Added on  2022-10-16

37 Pages13413 Words297 Views
ahmed choudhary
[COMPANY NAME] [Company address]
SECURITY ISSUES,
CHALLENGES AND
SOLUTIONS OF MANET

Executive Summary
Mobile ad hoc networks are a stand-alone set of handheld devices (laptops, mobile phones,
smart sensors etc.) communicating and collaborating in a decentralized way with one another,
without fixed infrastructure, in attempt to provide the required network capabilities. It
essentially is a dynamic network comprised of a compilation of mobile wireless nodes which
often communicate with one another without any centralized authority (device) being used.
MANET's are susceptible to different types of security attacks like worm hole, rushing
attacks, black hole etc. due to defining qualities including nature of wireless being the
medium, distributed services and dynamic topology. This document offers insight into
prospective ad hoc network use cases, various threats, and examines the technical difficulties
that are inherent to MANET as well.

Table of Contents
Table of Contents......................................................................................................................2
Chapter 1...................................................................................................................................3
Introduction...............................................................................................................................3
Background of study.................................................................................................................4
Problem statement.....................................................................................................................8
Aim of the study.........................................................................................................................8
Main research question.............................................................................................................9
What are Mobile data protection risks and wireless network system portability in cellular
ad hoc networks?.......................................................................................................................9
Secondary research questions...................................................................................................9
Chapter 2...................................................................................................................................9
Literature review.......................................................................................................................9
Related work.........................................................................................................................9
Background.........................................................................................................................10
Characteristics of MANET................................................................................................13
Application of MANETs....................................................................................................15
Research methodology............................................................................................................15
Qualitative methodology....................................................................................................15
Research strategy................................................................................................................16
The sampling designs.........................................................................................................16
The data collection..............................................................................................................16
The data analysis................................................................................................................17
Trustworthiness, validity and reliability..........................................................................17
Chapter 3.................................................................................................................................18

Findings...................................................................................................................................18
Flaws in MANET................................................................................................................18
Security issues in MANET.................................................................................................19
Challenges...........................................................................................................................20
Discussion, conclusion and recommendation........................................................................22
Security Attacks in MANET..............................................................................................22
Countermeasures................................................................................................................28
Chapter 4.................................................................................................................................30
Future Work............................................................................................................................30
Chapter 5.................................................................................................................................32
Conclusion...............................................................................................................................32
References...........................................................................................................................33
Chapter 1
Introduction
An ad hoc network is defined by (ZHANG, 2008) as “a collection of nodes communicating
with each other by forming a multi-hop network”. Shakeel Ahmed and Ramani (2007), define
a Mobile ad hoc network as “a system of wireless mobile nodes with routing capabilities, any
group of them is capable of forming an autonomous network that require no infrastructure
and is capable of organizing itself into arbitrary changeable topologies. Such a network may
operate in a stand-alone fashion, or may be connected to the larger Internet”.
Wireless networks offer connectivity flexibility among users located in different places. It
also does extension of network among buildings in different areas without a physical-wired
connection. Such connections are of two types; structured networks and Ad-Hoc networks.

Figure 1: Wireless networks classificationsΩ
Source: Monika et al (2010)
Background of study
Infrastructure wireless networks have access points for each device, and it consists of a
central controller. The Node links the networks through to the access point. The access point
assembles the connection between the simple set services and make the route available when
required. (BSSs).
Wireless ad-hoc networks are increasingly becoming among the most dynamic and
competitive networking and communication sectors since mobile devices are gaining
popularity. (Dixit and Kumar, 2018) contend that “a mobile ad-hoc network is formed by
collecting portable devices like laptops, smart phones, sensors, etc. that communicate through
wireless links with one another. These devices collaborate with each other to offer the
essential network functions in the nonappearance of immovable organization in a distributed
manner”. (Dixit and Kumar, 2018) further claim that this type of network “creates the way
for various innovative and stimulating applications by functioning as an independent network
or with multiple points of connection to cellular networks or the Internet”.
Wireless network
infrastructure
networks Ad-hoc networks

Figure 2: Wireless ad-hoc network
It is possible to identify wireless networks either as multi hop or single hop. It could be based
on infrastructure or even on ad-hoc. Either Wireless networks or devices communicate
directly with electromagnetic waves in a single hop setting. Devices communicate indirectly
with the base station in multi-hop wireless networks by transmitting data from one computer
to another.
MANET is an infrastructure less IP-based network of radio-connected mobile and remote
device nodes. It is recognized for its routable network characteristics in which each node
functions as a "router" for transmitting the traffic to another designated network node. (Kaur
and Singh, 2016)
Many new applications in the field of internet are wireless network technologies and one of
the most interesting areas is Mobile Ad- Hoc Network (MANET). (Raza et al., 2016)
describe Mobile Ad-Hoc Network (MANET) as “an infrastructure less wireless network of
autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network
is self-configured to re-construct its topology and routing table information for the exchange
of data packets on the joining and leaving of each node on ad-hoc basis”. Mobile Ad hoc
networks is a wireless network considered by (Monika, Kumar and Rishi, 2010) as “a new
paradigm offering unrestricted mobility without any underlying infrastructure such as base
station or mobile switching centers”.

Figure 3: Infrastructure based
Source: (Monika, Kumar and Rishi, 2010)
Figure 4: Infrastructure less
Source: (Monika, Kumar and Rishi, 2010)
Infrastructure less as well as ad-hoc networks miss firm topology or a central command point,
which is why information packet transmission and reception is more complicated than
infrastructure networks.
The following are the characteristics of a MANET:
“Autonomous Terminal,
Infrastructure-less and Self Operated,

Distributed operation,
Dynamic network topologies,
Multi-hop routing,
Energy constrained Operation,
Light–weight Terminal,
Ease of deployment and speed of deployment”.
Ad-hoc systems do not depend on any static infrastructure (base stations or even access
points) as opposed to traditional cellular networks. This versatility makes them more
attractive for several applications. (Monika, Kumar and Rishi, 2010) claim that “portable
devices, progress in wireless communication, and ad hoc networking are gaining ground with
the increasing number of widespread applications which include the following applications”
In Tactical networks this technology has its application in Military communication
and operation as well as automated battlefields.
For Emergency Services, it is applicable to search and rescue operations, disaster
recovery, policing and firefighting and as a mean of support for doctors and nurses in
hospitals.
It has been used to monitor guest networks at terminals in industrial and civilian
settings. IAreas also include, vehicular settings such as road or accident advice, traffic
and weather monitoring, and inter-vehicular sensor network.
It is used for Body Area network (BAN), home application: smart sensors and
actuators embedding consumer electronics.
In education, it is applicable in Universities and campus settings. Virtual classrooms.
Ad hoc communications during meetings or lectures.
In entertainment, it finds its application in multiuser games, wireless P2P networking,
outdoor Internet access and Theme parks.
For Location Aware Services, this technology is useful for automatic call forwarding;
advertise location specific services, and location-dependent travel guide.
(Raza et al., 2016) propose the benefits of MANETs as follows:
They provide access to information and services in such circumstances where fixed
infrastructure is too expensive or untrustworthy,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mobile Adhoc Network (MANET) and VoIP Performance
|13
|1909
|341

Current Challenges, and Future Perspective in Vehicular Ad-Hoc Networks
|19
|4643
|441

SPEED: A Real-Time Routing Protocol for Wireless Sensor Networks
|27
|2239
|314

Vehicular Ad-Hoc Network: Current Challenges, and Future Perspective
|23
|4698
|107

(Solved) Information Security: Assignment
|28
|7728
|183

Network Design and Architecture Review
|24
|4874
|147