IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569

Mobile Ad hoc Network Security Issues Rajeshwar Singh1, Abhinav Bhandari2 1

2

M.Tech, Department of Computer Engineering, Punjabi University Patiala, Punjab, India [email protected]

Assistant Professor, Department of Computer Engineering, Punjabi University Patiala, Punjab, India [email protected]

Abstract A Mobile Ad-hoc Network (MANET) is a dynamic multi hop wireless network established by a group of nodes in which there is no central administration. Ad hoc On Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocol are the two widely researched on-demand routing protocols in MANETs. These are highly vulnerable to network attacks as they lack security mechanisms. Among all network threats, Distributed Denial of Service (DDoS) attacks are the most harmful threats to network functionality. As some or all nodes of MANETs are in a dispersal pattern, it is difficult to apply a network-wide security up-grade. In this paper various kinds of DDoS attacks are identified & explored in different classifications like Interaction based & Network protocol stack based.

Keywords: MANETs, Distributed Denial of Service (DDoS), Ad Hoc On-Demand Distance Vector Routing Protocol (AODV), Dynamic Source Routing (DSR), Blackhole.

1. Introduction A Mobile Ad Hoc Network (MANET) is the collection of mobile nodes which enables the users to communicate without any physical infrastructure, regardless of their geographical location. Each node can act as both a network user and a router. Due to the mobility of each node, the network topology may change frequently and be unpredictable. MANETs are attractive in military or civil as required [1]. MANETs have typical advantages such as mobility, flexibility, and no fixed infrastructure as compared to the wired networks, but there are more research challenges for Wireless networks. The mobile nodes have limited battery and computation power. Some power saving strategies may be applied. The nodes may listen to the receivers periodically; therefore, the nodes may not receive the signals in time. They may also need time to wake up and get ready for the communication. This may lead to high communication latency [2]. There is a possibility of the radio signal getting absorbed or blocked by some objects. The radio signals in the same band from the nearby nodes could collide with each other. The range restriction and possible collisions makes packet loss more likely. Therefore, the bandwidth is often lower than that of a wired network [3]. Because of the mobility and flexibility of the nodes, it is required to quickly adapt to the change of the network topology and look up the specific node. A commercial MANET needs to implement a QoS solution for the traffic [4].

Rajeshwar Singh,

IJRIT- 170

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

Fig.1 Structure of MANETs [5] In this paper, various characteristics, applications, routing protocols and security challenges related to the mobile AdHoc networks are highlighted. The organization of the paper is done as follows. In section II some important characteristics of MANETs are discussed. Section III deals with the various routing protocols. In section IV emphasis is given on issues & challenges of MANETs and identification of DDoS Attacks in MANETs. Finally Section V concludes the paper.

2. Manets Characterstics 1) Autonomous and infrastructure less: MANET is a self-organized network, independent of any established infrastructure and centralized network administration. Each node acts as router and operates in distributed manner [5]. 2) Multi-hop routing: Since there exists no dedicated router, so every node also acts as a router and aids in forwarding packets to the intended destination. Hence, information sharing among mobile nodes is made available. 3) Dynamic network topology: Since MANET nodes move randomly in the network, the topology of MANET changes frequently, leading to regular route changes, network partitions, and possibly packet losses. 4) Variation on link and node capabilities: Every participating node in an ad hoc network is equipped with different type of radio devices having varying transmission and receiving capabilities.

3. MANETs Routing Protocols

Due to the presence of mobility, the routing information will have to be changed to reflect changes in link connectivity. There are several possible paths from source to destination. The routing protocols find a route from source to destination and deliver the packet to correct destination. The performance of MANETs is related to efficiency of the MANETs routing protocols [6] and the efficiency depends on several factors like convergence time after topology changes, bandwidth overhead to enable proper routing, power consumption and capability to handle error rates.

Rajeshwar Singh,

IJRIT- 171

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

Fig.2 MANETs Routing Protocols Figure 2 shows the prominent way of classifying MANETs routing protocols. The protocols may be categorized into two types, Proactive and Reactive. Other category of MANET routing protocols which is a combination of both proactive and reactive is referred as Hybrid.

3.1 Proactive Routing protocols

In it, all the nodes continuously search for routing information within a network, so that when a route is needed, the route is already known. If any node wants to send any information to another node, path is known, therefore, latency is low. However, when there is a lot of node movement then the cost of maintaining all topology information is very high [6].

3.2 Reactive Routing protocols

Whenever there is a need of path from any source to destination then a type of query reply dialog does the work. Therefore, the latency is high; however no unnecessary control messages are required. AODV uses limited bandwidth for wireless communication. It is inherited on demand route discovery and route maintenance mechanism from DSR. When a node wants to send a message to destination node, first it will check whether it has a valid route to the destination or not. If not, then it broadcast a route request packet (RREQ) to its neighbors which then forwards the request to their neighbors and so-on, until either it reaches to the intermediate node which has a valid route for the destination or the destination node [7]. Dynamic Source Routing (DSR) is an on demand routing protocol which uses source routing algorithm as a core concept of routing. In DSR nodes are maintained as route caches to store route information which is constantly updated when new route information arrives on the node. The protocol is based on two algorithms, route request approach determines the route discovery mechanism and route caching determines route maintenance mechanism. When a node needs to send packet to a destination, initially it will look at the route cache for available route to destination if these route already expires it will initiate route discovery operation broadcasting a route request message to its entire neighbor [7].

4. Security issues & challenges of Manets Mobile ad hoc Network is an increasingly promising area with many of the practical applications. But, it is vulnerable to number of security attacks including the DDoS (Denial of Service) attack due to its autonomous nature. In mobile ad hoc networks various kinds of DDoS attacks are possible. In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting research challenges. Limited bandwidth makes a network easily congested by control signals of the routing protocol. A Distributed Denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. The concerned motives and targets for DDoS attack may vary; it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. In DDoS attack the available bandwidth is attacked with the malicious traffic which makes the original traffic restricted to flow, meaning that the bandwidth is compromised. A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service.

4.1 Distributed Denial of Service Attacks: Internet was basically designed by keeping functionality in mind

and not security. The inherent vulnerability of internet makes it an easy target of many attacks. Among all the Internet attacks, DDoS attacks are one of the most significant threats to network functionality. DDoS attacks exhaust the network’s resource of a specific Internet service or system so that the legitimate users lose the access to the resource. The first DDoS attack case happened on Panix, the ISP (Internet Service Provider) of New York City area on September 6, 1996. According to the 2004 FBI Report on Cybercrime, the total reported costs of DDoS attacks were over $26 million [8]. Denial of service was the top source of financial loss due to cybercrime in 2004 [8]. DDoS attacks exploit the vulnerabilities of the network protocol architecture. DDoS attacks first appeared in the summer of 1999. The victims were several high capacity commercial and educational websites. The characteristics of Distributed Denial-of-Service (DDoS) are “WMD” (Wide, Massive, Dissemination). DDoS attacks are more powerful, leading to greater damage and easier to perform by Trojan horses, but harder to prevent and traced back because of the numerous compromised nodes also known as zombies. DDoS attackers uses a group of compromised nodes (zombies) to carry on a “large-scale coordinated” attack against the target nodes, where compromised nodes are called the “secondary Rajeshwar Singh,

IJRIT- 172

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

victims” and the target nodes are called the “primary victims”. DDoS traffic stream is not unusually high near the attack sources, so it is hard to detect DDoS attacks in the early stages when the attack traffic is still close to the source. DDoS traffic streams congest the victim node and often the intermediate nodes ahead of the victim [9]. With AgentHandler tools, such as Trinoo, Tribe Flood Network (TFN), and an attacker can command the compromised nodes to generate a flooding attack (Figure 3). A recent study shows that DDoS attacks are growing in size but to calculate an exact average is difficult due to the existence of many variables. Arbor's Q1 2013 data pegged the average size of an attack at 1.77 Gbps while the Prolexic is seeing average attack sizes at 48.25 Gbps. This difference is attributed to the cloud nature of prolexic. Prolexic also has discovered a notable trend emerging in the global DDoS landscape, with five different South American countries placing in the top 20 sources for malicious traffic in its Q1 2013 DDoS report [10].

:

Fig.3 MANETs Routing Protocols

4.2 Some Specific DDoS Attacks : SYN Flooding: The attacker uses the weakness of the TCP handshake. It sends an abundance of TCP SYN packets to the victim. The victim opens a lot of TCP connections and responds with ACK. But the attacker does not finish the hand-shake, which in result causes the half-open TCP connections to overflow the victim’s incoming queue. SYN Flooding does not target specific Operating System, so it may attack any system supporting TCP protocol (Figure 4) [11].

Fig. 4 SYN Flooding Attack [11] Ping of Death: The attacker sends the victim oversized IP packets, which contain more than 65,536 bytes. It may cause the victim machine to crash [12]. Smurf Attack: The attacker sends the broadcast address an abundance of Internet Control Message Protocol (ICMP) "echo-request" packets, which has the victim’s IP as the source address. The victim will be flooded with ICMP "echoreply" packets [13]. Rajeshwar Singh,

IJRIT- 173

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

4.3 Classification of security attacks at different layers of protocol Stack : Attacks could also be classified according to the target layer in the protocol stack (Figure 5).

Fig. 5 Attack classification at different layers Physical Layer Attacks: In physical layer attack, an attacker can intercept and read the message contents from open radio signals. Moreover, a radio signal can be jammed or interfered, which causes the message to be corrupted or lost [14] [15]. If the attacker has a powerful transmitter, a signal can be generated that will be strong enough to overwhelm the targeted signals and disrupt communications. The most common types of this form of signal jamming are random noise and pulse. Network Layer Attacks: Network layer protocols extend connectivity from neighboring nodes to all other nodes in MANETs. A variety of attacks targeting the network layer have been identified and studied. By attacking the routing protocols, attackers can absorb network traffic, inject themselves into the path between the source and destination, and thus control the network traffic flow. Some of the advanced attacks are explained as under. Black hole attack: In black-hole attack, first the node exploits the mobile ad hoc routing protocol, such as AODV to advertise itself as having a valid route to a destination node. A black hole attacker responds to all RREQ with a shortest route RREP [16]. After the attacker grabs the route, it may drop all the packets, or selectively forward some of the packets to hide the malicious nature. In fig. 6 attacker A claims to have shortest route to D1, D2 and D3.

Rajeshwar Singh,

IJRIT- 174

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

Fig. 6 A typical Black Hole attack [16] Selfish nodes: These nodes use the network but do not cooperate. They save the battery life, CPU cycles, and other resources for their own packets. Though they do not intend to directly damage other nodes, the result is less damaging inefficient network [15] Wormhole attack: In this kind of attack, the attacker forwards packets between each other by a tunnel and does not follow the protocol rules, which are based on hop based routing method. These tunneled control messages can severely disrupt the routing.

Fig. 7 Wormhole Attack In Fig. - 7, M1 and M2 are two end points of the tunnel. S is source node and D is the destination node. This tunnel can be created by number of ways including long-range wireless- transmission; attacker records packets at one end in the network [17] and tunnels them to other end-point in the network. This attack compromise the security of networks, for example, when a wormhole attack is used against AODV, than all the packets will be transmitted through this tunnel and no other route will be discovered. Wormhole attack detection & prevention scheme which is based on a social science theory called the diffusion of innovations and serves all network nodes in detecting and preventing the attack even without prior interaction with malicious nodes. Byzantine attack: A compromised intermediate node works alone, or a set of compromised intermediate nodes works in collusion and carry out attacks such as creating routing loops, forwarding packets through non-optimal paths, or selectively dropping packets, which results in disruption or degradation of the routing services [18]. Rushing attack: Two colluded attackers use the tunnel procedure to form a wormhole. If a fast transmission path (e.g. a dedicated channel shared by attackers) exists between the two ends of the wormhole, the tunneled packets can propagate faster than those through a normal multi-hop route. This forms the rushing attack [19]. The rushing attack can act as an effective denial-of-service attack against all currently proposed on-demand MANET routing protocols. Transport layer attacks: Due to lack of security in transport layer by default malicious node take the advantage and attack on the target network, in response to this victim node could configure it out when and how the attack invade on it, as MANETs node on the network are mobile therefore, the communication between node break and reconnected. In transport layer acknowledgement spoofing attack, malicious node start sending fake packets through wireless medium on the trigger network. The malicious sends a large amount of acknowledgement window with false acknowledgement to network nodes in response to this a source node send more segments than the network can handle. This action causing the congestion on the network and the transmission on the network medium is lost. Some of the transport layer attacks are as explained. Changing sequence number: Attackers can disturb an existing connection between two nodes by sending fabricated packets exceeding the sequence number to either node of the connection. It may result in letting the node keep sending retransmission requests for the missed frames [20]. Session Hijacking: Session hijacking takes advantage of the fact that most communications are protected at session setup but not thereafter. In session hijacking the malicious node spoofs the IP address of the victim and concludes the right sequence number and implements a DoS attack. Session hijacking gives an opportunity to a malicious node to act as an authorized node [20]. A session hijacking attacker takes over the TCP session between the victim and server. Application layer attacks: Application layer is upper last OSI layer. The function of this layer is to provide the end to end communication between nodes. Application layer represents the software application that provides the network services and connection to lower layer of OSI model. Many application layer attacks have been identified in MANETs. As MANET is self organized nodes therefore they are mostly like to get attack from malicious nodes. Rajeshwar Singh,

IJRIT- 175

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

Application layer attacks can be mobile viruses, worm attacks, and repudiation attacks. Some are as explained below. Malicious attack: In this attack a malicious node attack on the operation system (OS) of the other host node on the network. Malicious node sent a Malware or Trojan virus [21] in to a victim node. These attacks are severe and cause victim node to stop using the network resources. Repudiation attack: Transport layer and network layer security is not enough to prevent the attacker to attack on the nodes in network. Repudiation is the attack which is by passed by an attacker from transport and network layer. Repudiation attacks refer as denial of participation in the communication. Repudiation attack can be seen as Malware where as an attacker node keep accessing the system as a selfish node and deny any conducting operation which is coming from system in order to communication on the network.

5. Conclusion

Security is such an important feature that it could determine the success and wide deployment of MANETs. In this paper, an attempt has been made to reveal the security challenges & issues of Mobile Ad Hoc Networks (MANETs). AODV and DSR are the two most widely employed protocols in MANETs. Routing protocols are the main target of attackers. A variety of attacks have been classified on different classifications schemes such as Interaction based and Network protocol Stack based. It is concluded that Distributed Denial of Service (DDoS) attacks are the most harmful threats to network functionality. In future work can be done regarding the development of secure routing protocols and new methods to detect and mitigate the effect of the various DDoS attacks.

Acknowledgments I am grateful to Mr. Abhinav Bhandari, Assistant professor, department of Computer Engineering, UCoE Punjabi University, Patiala.

References [1] Priyanka Goyal, Sahil Batra, Ajit Singh, “A Literature Review of Security attack in Mobile Ad-hoc networks” International Journal of Computer Applications (0975-8887) Volume 9– No. 12 , November 2010. [2] Jelena Mirkovic, Sven Dietrich, David Dittrich and Peter Reiher(2005) Internet Denial of Service: Attack and Defense Mechanism, 400. [3] Ian F.Akyildiz, Weilian Su, Erdal Cayirci (2002) Computer Networks, 38, 393-422. [4] Vern paxson (2001) Computer Communication Review, 31(3), 38-47 [5] Prashant Mohapatra, Srikanth V. Krishnamurthy (2004) Ad. Hoc. Networks. Technologies, 4-10. [6] Guntupalli Lakshmikant, a gaiwak, P.D Vyavahere, “Simulation Based Comparitive Performance Analysis of Adhoc Routing Protocols”, in proceedings of TENCON 2008. [7] G. Vijaya Kumar, Y. Vasudeva Reddyr, M. Nagendra, current Research Work on Routing Protocols for MANET: A Literature Survey, International Journal on Computer Science and Engineering, Vol. 02, No. 03,pp. 706-713. [8] Stephen specht and Ruby Lee (2004) 17th Int’l Conf. parallel and Distributed Computing Systems, 536-543. [9] A Taxonomy of DDoS attacks and DDoS defense Mechanisms. Jelena Mirkovic, Janice Martin and peter Reither. Computer Science Department. University of California, Los Angeles, Technical Report. [10] [Online] http:// www.arbornetworks.com/news-and-events/press-releases/recent-press-releases. [11] Jonathan Lemon (2002) Resisting SYN Flood DoS Attacks with a SYN Cache, 89-97. [12] Vives, A.; palet, J., “IPv6 Distributed Security: Problem Statement, “The 2005 Symposium on Applications and the Internet Workshops, 2005. Saint Workshops 2005, vol., 18-21, 31-04 Jan. 2005. [13] Sanjeev Kumar, “ Smurf –based Distributed Denial of Service (DDoS), Attack Amplification in Internet” ,Second International Conference on Internet Monitoring and Protection (ICMP 2007) 0-7695-2911-9/07 2007 IEEE. [14] T. karygiannis and L. Owens, wireless Network Security- 802.11, Bluetooth and Handheld Devices. National Institute of Standards and Technology. Administration, U.S Department of Commerce, special Publication 800848, 2002. [15] R. Nichols and P. Lekkas, Wireless Security- Models, Threats, and Solutions, Mcgraw-Hill, Chapter 7, 2002. [16] M. Al- Shurman, S-m. Yoo, and S. Park, “Black Hole Attack in Mobile Ad-Hoc Networks”, ACM Southeast Regional Conf. 2004. Rajeshwar Singh,

IJRIT- 176

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 170-177

[17] R. Maulik and N. Chaki. A Comprehensive Review on Wormhole Attacks in MANET. In Proceedings of 9th International Conference on Computer Information systems And Industrial Management Applications, pp. 233238, 2010 [18] B. Awerbuch, D. Holmer, C. Nita-rotaru, and H. Rubbens An on- demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on wireless security (WiSe), pp. 21-30, 2002. [19] Y. Hu, a. Perrig, and D. Johnson, Rushing Attacks and Defence in Wireless Ad Hoc Network Routing Protocol. Proc. of the ACM Workshop on Wireless Security (Wise), pp. 30-40, 2003. [20] H. Hsieh and R. Sivakumar, Transport Over Wireless Networks. Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenovic. John Wiley and Sons, Inc., 2002. [21] N. Weaver, V. Paxson, S. Staniford, and R. Cunninghan, “A Taxonomy of Computer Worms”, First Workshop on Rapid Malcode (WORM), 2003.

Rajeshwar Singh,

IJRIT- 177

Mobile Ad hoc Network Security Issues - International Journal of ...

IJRIT International Journal of Research in Information Technology, Volume 3, ... Among all network threats, Distributed Denial of Service (DDoS) attacks are the ...

491KB Sizes 3 Downloads 269 Views

Recommend Documents

Mobile Ad hoc Network Security Issues - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 3, ... A Mobile Ad-hoc Network (MANET) is a dynamic multi hop wireless network ...

Adaptive Quality of Service for a Mobile Ad Hoc Network
Adaptive Quality of Service for a Mobile Ad Hoc Network. Antonis Dimakis ... routing system that can provide different classes of service in ... typical applications.

NETWORK SECURITY & CRYPTOGRAPHY - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 2 .... These security breaches could also result in monetary losses of a large degree.

NETWORK SECURITY & CRYPTOGRAPHY - International Journal of ...
knowledge of the internet, its vulnerabilities, attack methods through the internet, and security ... Current development in network security hardware and software.

Survey on Internet Connectivity for Mobile Ad Hoc Network
node leaves the subnet from which its address is assigned, the node cannot be located using IP routing. Its. IP address no longer accurately reflects its point of attachment to the network. In view of the increasing demand for wireless information an

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
... tends to infinity. This is the best perfor- ...... The next theorem reveals a good property of uniformly ..... 005); National High tech grant of China (2009AA01Z248,.

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
less ad hoc networks with infrastructure support. Mobility and ..... different complete proof of the upper bound is also available in [3]. But our approach is simpler.

Wireless, mobile ad-hoc network routing Mario Gerla ...
In a wireless environment, a radio link between mobile nodes may experience frequent disconnects and reconnects. The L S protocol releases a link state update for each such change, which floods the network and causes excessive overhead. F S R avoids

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Keywords-Ad hoc wireless networks; hybrid wireless net- work; mobility; capacity .... A smaller m represents a more severe degree of clustering and vice versa.

Survey on Internet Connectivity for Mobile Ad Hoc Network
(Wi-Fi) network adapters enable the spontaneous creation of city-wide MANETs. These networks could then constitute the infrastructure of numerous applications such as emergency and health-care systems, groupware, gaming, advertisements, etc. As users

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Jun 24, 2010 - Uniformly Dense Networks. Non-uniformly Dense Networks. Capacity Scaling in Mobile Wireless Ad Hoc. Network with Infrastructure Support.

4.Security in Mobile Ad-hoc Networks.pdf
Security in Mobile Ad-hoc Networks.pdf. 4.Security in Mobile Ad-hoc Networks.pdf. Open. Extract. Open with. Sign In. Main menu.

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
Cross-Tier MAC Protocol .... black and is searching for the best neighbor to use as its black ... COM, send a Connection Relay Message (CRM) to G3 telling.

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
enable assured delivery of large volumes of critical data within a battlefield by ground nodes and airborne communication nodes (ACNs) at various altitudes.

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
Mobile ad hoc networks re wireless networks formed by wireless devices in sharing or PAN ... Nodes in turn respond to these changes and direct packets on the.

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
mobility, bandwidth issues of this specialized hoc architecture. However all protocols ... routes as computed by the packets as per the stored network map data.

Adaptive Quality of Service for a Mobile Ad Hoc Network - CiteSeerX
... of the ad hoc network is mobile and has one or more wireless network interfaces. ... Another advantage is when a link fails in a transit cluster, local rerouting of ...

A survey of compromised AODV-based mobile ad hoc network due to ...
Abstract – A mobile ad hoc network (MANET) is an infrastructure less network and dynamic in nature which consists of mobile nodes that communicates with each other without any control of a centralized access point like a base station. Due to its dy

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
3.4 Interference and Jamming: Radio signals can be blocked or interfered with, which causes the message to be corrupted or lost. If the attacker has a powerful transmitter, a signal can be generated that will be strong enough to overwhelm the targete

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
Abstract: Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure- less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for diff

Fuzzy Control of Swarm Ad-Hoc Network Based ...
Indian Institute of technology, Kharagpur – 721302, India. E-mail: [email protected]. Abstract. A swarm based fuzzy logic control of robots is proposed ...

Adaptive Quality of Service for a Mobile Ad Hoc Network - CiteSeerX
routing system that can provide different classes of service in a mobile ad hoc ... mobile and has one or more wireless network interfaces. Each interface can ...

A survey of compromised AODV-based mobile ad hoc network due to ...
network due to Blackhole attack and solutions. Hemal Patel. Priyang Bhatt. Department of Information Technology. Department of Computer Engineering.