One of the popular networks highly used for creating various Adhoc network applications is Mobile Ad hoc Networks, which are vulnerable to various security attacks, one of which is the blackhole attack. One of the networks that come under MANET is the Vehicular Adhoc network. It uses multi-hop data transmission, which provides various pathways to malicious attacks. One of the attacks, non-identifiable easily, is a blackhole attack, a category of DoS attack. Earlier research methods provided different algorithms for identifying and detecting individual attacks or standard security methods. At the same time, the accuracy of malicious activity detection and elimination is not up to the mark. In which a malevolent node misleadingly publicizes itself as having the shortest path to a destination, causing other nodes to send their data to it, which the attacker discards. This paper proposes a genetic algorithm-based approach for detecting blackhole attacks in VANETs. Our approach uses a combination of network metrics, such as network throughput and end-to-end delay, and genetic algorithms to identify malicious nodes. The genetic algorithm is used to optimize the selection of network metrics and determine the weights given to each metric in the detection process. Simulation results show that our approach effectively detects blackhole attacks with high accuracy and low false positive rates.
Authored by Ganesh Dangat, S. Murugan
In Mobile Adhoc Networks (MANETs), resilient optimization is based on the least energy utilization as well as privacy. The crucial concerns for the productive design to provide multi-hop routing are security and energy consumption. Concerning these problems, we present in this paper an author proposed routing protocol called Protected Quality of Service (QoS) aware Energy Efficient Routing protocol. It is developed on trust along with energy efficiency and points to improve MANET security.
Authored by Satyanarayana P., Nihani V., Joshua A., Kumar A., Sai H.
MANET Security - The detection and maintenance of the pathway from the source to the destination or from one node to another node is the major role played by the nodes in the MANET. During their period, nodes arrive or leave the network, and endlessly modify their comparative location. The dynamic nature introduces several security issues. Secure routing protocol is a significant area for attaining better security in the network by keeping the routing protocols against attacks. Thus, this research work focuses on developing a secure routing protocol for MAN ET. Here, a dynamic anomaly detection scheme has proposed to detect against malicious attacks in the network. This scheme has been incorporated with AODV protocol to enhance the performance of AODV in disseminating packets to target node. In this research work Protected AODV (PAODV) is protocol is introduced to identify the false alarm node in the network and route path for reliable communication between the source to destination. Simulation results it shows the detection rate, Packet drop rate and delay is minimized compare to the existing technique.
Authored by Jebakumar D, E.P. Prakash, Dhanapal R, Aby Thomas, K. Karthikeyan, P. Poovizhi
MANET Security - Recently, the mobile ad hoc network (MANET) has enjoyed a great reputation thanks to its advantages such as: high performance, no expensive infrastructure to install, use of unlicensed frequency spectrum, and fast distribution of information around the transmitter. But the topology of MANETs attracts the attention of several attacks. Although authentication and encryption techniques can provide some protection, especially by minimizing the number of intrusions, such cryptographic techniques do not work effectively in the case of unseen or unknown attacks. In this case, the machine learning approach is successful to detect unfamiliar intrusive behavior. Security methodologies in MANETs mainly focus on eliminating malicious attacks, misbehaving nodes, and providing secure routing.
Authored by Wafa Bouassaba, Abdellah Nabou, Mohammed Ouzzif
MANET Security - The current stady is confined in proposing a reputation based approach for detecting malicious activity where past activities of each node is recorded for future reference. It has been regarded that the Mobile ad-hoc network commonly called as (MANET) is stated as the critical wireless network on the mobile devices using self related assets. Security considered as the main challenge in MANET. Many existing work has done on the basis of detecting attacks by using various approaches like Intrusion Detection, Bait detection, Cooperative malicious detection and so on. In this paper some approaches for identifying malicious nodes has been discussed. But this Reputation based approach mainly focuses on sleuthing the critcal nodes on the trusted path than the shortest path. Each node will record the activity of its own like data received from and Transferred to information. As soon as a node update its activity it is verified and a trust factor is assigned. By comparing the assigned trust factor a list of suspicious or malicious node is created..
Authored by Prolay Ghosh, Dhanraj Verma
MANET Security - Remote correspondence innovations are assuming a critical part in the plan and execution of Mobile Ad hoc Network (MANET). The portrayal of MANET, for example, dynamism in geography, restricted transfer speed and power usage expands the unlicensed correspondence advancements and intricacies in existing conventions. This paper analyzes the current and not so distant future Wireless correspondence Technologies in the 2.4 GHz band. Additionally, this paper thinks about the features and limits of those advances lastly closes with the need for the improvement of reasonable brought together convention for existing and future remote advances. It has been considered that the overview and correlation introduced in this paper would help specialists and application engineers in choosing a fitting innovation for MANET administrations.
Authored by Seema Barda, Prabhjot Manocha
MANET Security - Mobile ad hoc networks can expand access networks service zones and offer wireless to previously unconnected or spotty areas. Ad hoc networking faces transmission failures limited wireless range, disguised terminal faults and packet losses, mobility-induced route alterations, and battery constraints. A network layer metric shows total network performance. Ad-hoc networking provides access networks, dynamic multi-hop architecture, and peer-to-peer communication. In MANET, each node acts as a router, determining the optimum route by travelling through other nodes. MANET includes dynamic topology, fast deployment, energy-restricted operation, and adjustable capacity and bandwidth. Dynamic MANET increases security vulnerabilities. Researchers have employed intrusion detection, routing, and other techniques to provide security solutions. Current technologies can t safeguard network nodes. In a hostile environment, network performance decreases as nodes increase. This paper presents a reliable and energy-efficient Firefly Energy Optimized Routing (IFEOR)-based routing method to maximise MANET data transmission energy. IFEOR measures MANET firefly light intensity to improve routing stability. The route path s energy consumption determines the firefly s brightness during MANET data packet transfer. Adopting IFEOR enhanced packet delivery rates and routing overheads. End-to-end delay isn t reduced since nodes in a route may be idle before sending a message. Unused nodes use energy.
Authored by Morukurthi Sreenivasu, Badarla Anil
MANET Security - Many systems have recently begun to examine blockchain qualities in order to create cooperation enforcement methods. This paper provides a complete aod extensive evaluation of work on multi-hop MANETs with blockchain-based trust control between nodes. We contextualize tbe snag of security in MANETs resulting from the lack of trust between the participating nodes. We present tbe blockchain concepts aod discuss tbe limitation of tbe current blockchain in MANETs. We review the promising proposed ideas in the state-of-the-art based on research papers. FinaUy, we discuss aod summarize strategies and chaUenges for further research.
Authored by Ahmed Abdel-Sattar, Marianne Azer
MANET Attack Detection - Mobile Adhoc Networks also known as MANETS or Wireless Adhoc Networks is a network that usually has a routable networking environment on top of a Link Layer ad hoc network. They consist of a set of mobile nodes connected wirelessly in a self-configured, self-healing network without having a fixed infrastructure. MANETS, have been predominantly utilized in military or emergency situations however, the prospects of Manets’ usage outside these realms is now being considered for possible public adoption in light of the recent global events such as the pandemic and new emerging infectious diseases. These particular events birthed new challenges, one of which was the considerable strain that was placed on mainstream ISP’s. Whilst there has been a significant amount of research conducted in the sphere Manet Security via various means such as: development of intrusion detection systems, attack classification and prediction systems, etcetera. There still exists prevailing concerns of MANET security and risks. Additionally, recently researched trends within the field has evidenced key disparities in terms of studies related to MANET Risk profiles. This paper seeks to provide an overview of existing studies with respect to MANETS as well as briefly introduces a new method of determining the initial Risk Profile of MANETS via the usage of probabilistic machine learning techniques. It explores new regions of probability-based approaches to further supplement the existing impact-based methodologies for assessing risk within Manets.
Authored by Hosein Michael, Aqui Jedidiah
MANET Attack Detection - One of the most essential self-configuring and independent wireless networks is the MANET. MANET employs a large number of intermediate nodes to exchange information without the need for any centralized infrastructure. However, some nodes act in a selfish manner, utilizing the network's resources solely for their own benefit and refusing to share with the surrounding nodes. Mobile ad hoc network security is a critical factor that is widely accepted. Selfish nodes are the primary problem of MANET. In a MANET, nodes that are only interested in themselves do not involve in the process of packet forwarding. A node can be identified as selfish or malicious due to some misbehavior reasons. Selfishness on the part of network nodes may be a factor in the low delivery ratio of packets and data loss. A high end-to-end delay is caused by node failure in a MANET network. To study the selfish node attack, a malicious selfish node is put into the network, and a trust-based algorithm for the selfish node attack is also suggested. In order to discover a solution to this issue, we have developed an algorithm called SNRM for the detection of selfish nodes. The routing protocol used in this paper for analysis is AODV. Using a simulation tool, PDR and end-to-end delay are evaluated and compared.
Authored by R. Sarumathi, V. Jayalakshmi
MANET Attack Detection - Recently, the mobile ad hoc network (MANET) has enjoyed a great reputation thanks to its advantages such as: high performance, no expensive infrastructure to install, use of unlicensed frequency spectrum, and fast distribution of information around the transmitter. But the topology of MANETs attracts the attention of several attacks. Although authentication and encryption techniques can provide some protection, especially by minimizing the number of intrusions, such cryptographic techniques do not work effectively in the case of unseen or unknown attacks. In this case, the machine learning approach is successful to detect unfamiliar intrusive behavior. Security methodologies in MANETs mainly focus on eliminating malicious attacks, misbehaving nodes, and providing secure routing. In this paper we present to most recent works that propose or apply the concept of Machine Learning (ML) to secure the MANET environment.
Authored by Wafa Bouassaba, Abdellah Nabou, Mohammed Ouzzif
MANET Attack Detection - The current stady is confined in proposing a reputation based approach for detecting malicious activity where past activities of each node is recorded for future reference. It has been regarded that the Mobile ad-hoc network commonly called as (MANET) is stated as the critical wireless network on the mobile devices using self related assets. Security considered as the main challenge in MANET. Many existing work has done on the basis of detecting attacks by using various approaches like Intrusion Detection, Bait detection, Cooperative malicious detection and so on. In this paper some approaches for identifying malicious nodes has been discussed. But this Reputation based approach mainly focuses on sleuthing the critcal nodes on the trusted path than the shortest path. Each node will record the activity of its own like data received from and Transferred to information. As soon as a node update its activity it is verified and a trust factor is assigned. By comparing the assigned trust factor a list of suspicious or malicious node is created.
Authored by Prolay Ghosh, Dhanraj Verma
MANET Attack Detection - The MANET architecture's future growth will make extensive use of encryption and encryption to keep network participants safe. Using a digital signature node id, we illustrate how we may stimulate the safe growth of subjective clusters while simultaneously addressing security and energy efficiency concerns. The dynamic topology of MANET allows nodes to join and exit at any time. A form of attack known as a black hole assault was used to accomplish this. To demonstrate that he had the shortest path with the least amount of energy consumption, an attacker in MATLAB R2012a used a digital signature ID to authenticate the node from which he wished to intercept messages (DSEP). “Digital Signature”, “MANET,” and “AODV” are all terms used to describe various types of digital signatures. Black Hole Attack, Single Black Hole Attack, Digital Signature, and DSEP are just a few of the many terms associated with MANET.
Authored by Sunil Gupta, Mohammad Shahid, Ankur Goyal, Rakesh Saxena, Kamal Saluja
MANET Attack Prevention - Mobile ad hoc networks (MANETS) have gained much attention due to their dynamic nature and efficiency. These networks are operated in highly dynamic and unpredictable environment. Rapid advances in the field of correspondence have vastly enhanced today's transmission networks. As a result, the measurement of data transmission in business and military applications has grown dramatically. Since these applications include the transmission of information, the need for security concerns has grown as well. Due to their dynamic nature, they are susceptible to various attacks. The lack of a centralized authority to supervise the individual nodes operating in the network makes security in the mobile adhoc network a major challenge. Attacks can originate both within and outside the network. In this paper, a survey of various attacks in MANETs and their prevention and mitigation techniques given by researchers have been presented.
Authored by Shashank Shekhar, Makul Mahajan, Sukhkirandeep Kaur
MANET Attack Prevention - Recently, the rising use of portable devices with advanced wireless communication gives Mobile ad-hoc networks more significance with the expanding number of widespread applications. This infrastructure uses a link-to-link wireless connection to transfer the data called route, which uses a routing protocol. AODV is a reactive protocol that uses control packets to discover a route toward the destination node in the network. Since MANET is an open infrastructure without a centralized controller, it is at risk of security assaults that are generated through the malicious node at the time of route discovery and data transmission. For example, the Blackhole attack in which the offender node retains and drops few or all data/control packets by using vulnerabilities of the on-demand routing protocols. This paper proposed a trust-based method to prevent the network against blackhole attack. This paper modeled the behavior of blackhole node and proposes a trust-based security technique. Further suggested technique is analyzed and evaluated against various evaluation metrics like PDR, throughput, end-to-end delay, attack percentage, etc. The proposed security technique is also compared with three different scenarios, namely attack, watchdog, and IDS scenarios, using the above evaluation metrics. The comparison shows that the proposed trust-based security ensures the detection and prevention against blackhole nodes not only at the time of route discovery but also at the time of real-time data transmission.
Authored by Etsegenet Lema, Esubalew Desalegn, Basant Tiwari, Vivek Tiwari
MANET Attack Prevention - Since the mid-1990s, the growth of laptops and Wi-Fi networks has led to a great increase in the use of MANET (Mobile ad hoc network) in wireless communication. MANET is a group of mobile devices for example mobile phones, computers, laptops, radios, sensors, etc., that communicate with each other wirelessly without any support from existing internet infrastructure or any other kind of fixed stations. As MANET is an infrastructure-less network it is prone to various attacks, which can lead to loss of information during communication, security breaches or other unauthentic malpractices. Various types of attacks to which MANET can be vulnerable are denial of service (DOS) and packet dropping attacks such as Gray hole, Blackhole, Wormhole, etc. In this research, we are particularly focusing on the detection and prevention of Gray hole attack. Gray hole node drops selective data packets, while participating in the routing process like other nodes, and advertises itself as a genuine node. The Intrusion Detection System (IDS) technique is used for identification and aversion of the Gray hole attack. Use of AODV routing protocol is made in the network. The network is incorporated and simulation parameters such as PDR (Packet Delivery Ratio), Energy Consumption, End-to-end delay, and Throughput are analyzed using simulation software.
Authored by Manish Chawhan, Kruttika Karmarkar, Gargi Almelkar, Disha Borkar, Kishor. Kulat, Bhumika Neole
MANET Attack Prevention - The MANET architecture's future growth will make extensive use of encryption and encryption to keep network participants safe. Using a digital signature node id, we illustrate how we may stimulate the safe growth of subjective clusters while simultaneously addressing security and energy efficiency concerns. The dynamic topology of MANET allows nodes to join and exit at any time. A form of attack known as a black hole assault was used to accomplish this. To demonstrate that he had the shortest path with the least amount of energy consumption, an attacker in MATLAB R2012a used a digital signature ID to authenticate the node from which he wished to intercept messages (DSEP). “Digital Signature”, “MANET,” and “AODV” are all terms used to describe various types of digital signatures. Black Hole Attack, Single Black Hole Attack, Digital Signature, and DSEP are just a few of the many terms associated with MANET.
Authored by Sunil Gupta, Mohammad Shahid, Ankur Goyal, Rakesh Saxena, Kamal Saluja
MANET Privacy - A sub group of mobile ad hoc network(MANET) that is vehicular Ad Hoc Network (VANET) that assists in, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) intercommunications. An important characteristics of VANET consists of, highly dynamic, distributed networking and self-organizing topologies. In safeguarding billions of human live features of VANET and its uses regarding safety on roads drew attention towards huge amount of interest in academic fields and industries, moreover with study and development on enhancing the facilities of transport transit infrastructure. Major challenging and crucial security problems takes place during information transmission with open-access surrounding such as VANET. Non-repudiation, data confidentiality, Authentication, data availability and data integrity behave as a critical part of VANET’s security. Privacy preservation over VANET is major concern, in this research we will elaborate different attacks over VANET and will conclude how block chain based VANET will perform better and less error prone.
Authored by Anand Patil, Sujata Mallapur
MANET Privacy - Massive amounts of data are being stored in cyberspace as a result of the expansion of the Internet, IoT, and various networking technologies. The privacy and security are the most essential aspects of a network. This survey analyzed the functions of blockchain in network security. The blockchain-based network security mechanism may be used to increase network security because of its decentralization, tamper-resistance, traceability, high availability, and credibility. This survey offers a review of network security studies and their contributions and limits with a critical comparison analysis based on a complete and comprehensive research of the evolution of Blockchain, architectures, working principle, security, and privacy features. This analysis examines network security applications based on blockchain technology with various networking technologies, such as IoT, Industrial IoT, WSN, MANET, VANET, Vehicular Social Network, In-vehicle networking, mobile networks (5G), and so on. For communication, the majority of these networking technologies were combined with IoT. As a result, in this study, the Internet of Things is considered as the primary network employed in important research as examined in the literature review. As a result, the application of network security utilizing blockchain was examined in this study using IoT. This research presents a comparison based on several network solutions that employ blockchain for network security. Finally, the blockchain application in various networks, as well as its difficulties, are examined.
Authored by S. Manimurgan, T. Anitha, G. Divya, Charlyn Latha, S. Mathupriya
MANET Privacy - Various routing methods and approaches are being integrated into wireless networks, making it a topic for future investigation. The two primary wireless routing issues under research are security and congestion reduction. The bulk of security research relies on key-based approaches or third-party trust control systems. The routing protocol would be secured by validating a nonblocking identity, which is relayed to each site via protocol, according to the study's enhanced route security. Adhoc upon Request Vertical (AODV) connectivity is a dynamically routing technique that chooses the best route based on the databases of its neighbors. The research in this article emphasizes privacy for routing security, and simulators are given to show the improved delivery ratio, speed, end-to-end lag, and reduced packet loss rate of the Ad hoc On Requirement Done Accordingly (AODV) networking protocol. Attacks are deliberately avoided by modifying the basic implementation of the AODV networking protocol. Further suggestions made in this research include the deployment of an access control strategy and distinctive key-based verification for AODV. There is always a need for research in this area since security measures might have a detrimental influence on the functioning of the system in place. There is an urgent need for continued study in this area but since audiovisual and audio industries are growing quickly.
Authored by Priyanka Shah, Om Prakash, K Balaji, Surendra Shukla, Meenakshi Sharma, Jasdeep Singh
MANET Privacy - In Mobile Adhoc Networks (MANETs), resilient optimization is based on the least energy utilization as well as privacy. The crucial concerns for the productive design to provide multi-hop routing are security and energy consumption. Concerning these problems, we present in this paper an author proposed routing protocol called Protected Quality of Service (QoS) aware Energy Efficient Routing protocol. It is developed on trust along with energy efficiency and points to improve MANET security. The proposed work utilizes an identification methodology in the company of a key based safety feature for assigning trust ratings. This study also determines three categories of trust ratings, including direct, indirect, and overall trust scores, beneficial to increase communication security. The head of a cluster is selected among the nodes based on QoS metrics and scores of the trust which is referred to as a cluster based secured routing approach. Finally, to carry out the safe routing procedure as efficiently as possible, the required final path that is picked depends on path trust, energy consumption, and hop number. The suggested work was evaluated via simulations using the Ns2 simulator. The proposed strategy beats others in the matter of enhanced delivery rate of the packets, lifetime of a network, and security according to the simulation findings. Further, the proposed safe routing technique saves time and energy as compared to current relevant secure routing methods.
Authored by Satyanarayana P., Nihani V., Joshua A., Kumar A., Sai H.
Information Centric Networks - Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.
Authored by Riyanto, Suhono Supangkat, Iskandar
Wireless ad hoc networks are characterized by dynamic topology and high node mobility. Network attacks on wireless ad hoc networks can significantly reduce performance metrics, such as the packet delivery ratio from the source to the destination node, overhead, throughput, etc. The article presents an experimental study of an intrusion detection system prototype in mobile ad hoc networks based on machine learning. The experiment is carried out in a MANET segment of 50 nodes, the detection and prevention of DDoS and cooperative blackhole attacks are investigated. The dependencies of features on the type of network traffic and the dependence of performance metrics on the speed of mobile nodes in the network are investigated. The conducted experimental studies show the effectiveness of an intrusion detection system prototype on simulated data.
Authored by Leonid Legashev, Luybov Grishina
Vehicle Ad-Hoc Networks (VANETs) are a special type of Mobile Ad-Hoc Network (MANETs). In VANETs, a group of vehicles communicates with each other to transfer data without a need for a fixed infrastructure. In this paper, we compare the performance of two routing protocols: Ad-hoc on Demand Distance Vector protocol (AODV) and Destination-Sequenced Distance Vector protocol (DSDV) in VANETs. We measure the reliability of each protocol in the packet delivery.
Authored by Ahmed Yassin, Marianne Azer
This paper addresses the issues in managing group key among clusters in Mobile Ad hoc Networks (MANETs). With the dynamic movement of the nodes, providing secure communication and managing secret keys in MANET is difficult to achieve. In this paper, we propose a distributed secure broadcast stateless groupkey management framework (DSBS-GKM) for efficient group key management. This scheme combines the benefits of hash function and Lagrange interpolation polynomial in managing MANET nodes. To provide a strong security mechanism, a revocation system that detects and revokes misbehaviour nodes is presented. The simulation results show that the proposed DSBS-GKM scheme attains betterments in terms of rekeying and revocation performance while comparing with other existing key management schemes.
Authored by V.S. Janani, M. Devaraju