A Study on the Security and Routing Protocols for Ad-Hoc network

Page 1

ISSN No. 2278-3091 Volume 1, No.3, July – August 2012 International Journal of Advanced Trends in Computer Science and Engineering Available Online at http://warse.org/pdfs/ijatcse05132012.pdf

A Study on the Security and Routing Protocols for Ad-Hoc network Mrs. Sneha Kumari1, Dr. Maneesh Shrivastava2 Department of Information Technology, LNCT, Bhopal, India, sneha3024@gmail.com 2 Department of Information Technology, LNCT, Bhopal, India, maneesh.shreevastava@yahoo.com 1

ABSTRACT

The Ad Hoc network does not rely on a preexisting infrastructure also it lacks a centralized administration. The decentralized architecture makes ad hoc network much vulnerable to various attacks. In this paper we analyze the major vulnerabilities in the MANET along with the various attack types taking place within it. Then we present a review over current solution and the various routing protocols emphasizing over the security issues of the ad hoc network.

the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes. Lack of incorporation of security features in statically configured wireless routing protocol not meant for ad hoc environments. Because the topology of the ad hoc networks is changing constantly, it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol.

Key words: Ad-Hoc, attacks, MANET, routing protocol, security, vulnerability. 1.

INTRODUCTION

A Mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. ad hoc is a Latin word which means "for this purpose”. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the large internet [8]. As ad hoc networks do not have any fixed infrastructure, all network functions can be performed by the mobile nodes themselves in a self-organizing manner. This gives rise to much vulnerability in ad hoc networks, making the issue of security very important and challenging [1].. The mobile ad hoc network has the following typical features:

Unreliability of wireless links between nodes. Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between mobile nodes in the ad hoc network are not consistent for the communication participants.

Figure 1: A Basic diagram showing an Ad hoc network

Figure1 given above shows the generic architecture of an Ad hoc network [12] .The network consists of various nodes interacting with each other. All of these devices are movable and hence forming decentralized Ad hoc network architecture. 2.

Constantly changing topology. Due to the continuous motion of nodes, the topology of the mobile ad hoc network changes constantly: the nodes can continuously move into and out of

VULNEREBILITY IN AD HOC NETWORK

Mobile ad hoc network is insecure by its nature: there is no such a clear line of defence because of the freedom for the nodes to join, leave and move inside the network; some of 102

@ 2012, IJATCSE

All Rights Reserved


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A Study on the Security and Routing Protocols for Ad-Hoc network by The World Academy of Research in Science and Engineering - Issuu