Change search
ReferencesLink to record
Permanent link

Direct link
Security Threats in Mobile Ad Hoc Network
Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
Blekinge Institute of Technology, School of Engineering, Department of Interaction and System Design.
2007 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesis
Abstract [en]

Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

Place, publisher, year, edition, pages
2007. , 37 p.
Keyword [en]
MANET, blackhole, wormhole, DoS, routing, TCP ACK storm, backoff scheme
National Category
Computer Science Telecommunications
URN: urn:nbn:se:bth-5926Local ID: diva2:833341
Available from: 2015-04-22 Created: 2007-04-19 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

fulltext(230 kB)266 downloads
File information
File name FULLTEXT01.pdfFile size 230 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
Department of Interaction and System Design
Computer ScienceTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 266 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 2596 hits
ReferencesLink to record
Permanent link

Direct link