Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Volume 4 Issue 2, February 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
(a) (b)
Figure1: Infrastructure and Infrastructure-less Wireless Networks.
The infrastructure-less wireless network is also known as a mobile Ad-hoc network. There are different descriptions adopted
for this type of wireless network, however, the fundamental features remain the same.
According to Cason et al (1996), it is an autonomous system node connected with wireless link. Singh and Dhiman 2013,
describe mobile Ad-hoc network (MANET) as a complex distributed system that comprises of wireless mobile node that are
freely and dynamically self-organize into arbitrary and temporary network topologies.
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 721
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Nithya et al 2016, described a mobile Ad hoc network as a collection of wireless nodes that can dynamically be set up
anywhere, anytime without having the pre-existing network infrastructure. It is an autonomous collection of mobile devices
which forms a temporary network without the aid of centralized administration or standard support devices regularly
available in conventional networks. These different definitions of mobile Ad-hoc network outline some basic fundamental
features/characteristics that are associated with this technology.
Distributed Operation: The mobile Ad-hoc network do not have any central control operational mode. In other words, the
control and management of the network is distributed among the nodes. The nodes collaborate with each other to provide
efficient routing protocol and handle their peculiar security issues.
Multi-Hop Routing: Mobile Ad-hoc network employ the principles of single hop transmission for nodes within the network
transmission range. However, for transmission of data packets outside/beyond the transmission range, the network makes use
of multi-hop transmission. Data packet delivery from a source to its destination beyond transmission range is forwarded
through one or more intermediate nodes (Singh and Dhiman, 2013).
Dynamic Topology: The mobility feature of MANET makes it impossible to have a consistent topology. The configuration of the
node keeps changing due to the mobile nature of the node. This consequently leads to changes in the routing table of the
network.
Weak Link/Connectivity: Mobile Ad-hoc network makes use of wireless communication link. In this regard, the robustness,
reliability, efficiency of its wireless links are often weaker/inferior when compared with wired links. This limitation makes
them more prone to bit transmission error and security issues.
Similar Terminal Feature: All terminals in Mobile Ad-hoc network sometimes possess identical features with similar
responsibilities and capabilities.
Network Scalability: The ease for Mobile Ad-hoc network configuration creates room for its expansion and upgrade. In some
applications (large environment sensor, fabrics, battlefield deployment, urban vehicle grids) Mobile Ad-hoc network can grow
to numerous thousand nodes (Kopekar and Kumar, 2015).
Terminal Energy Constraint: Mobile Ad-hoc network terminal devices have restrictions on the power source in order to
maintain portability, size and weight (Aarti and Tyagis, 2013). They also possess less CPU (central processing unit) processing
capability, smaller memory size. These limitations necessitate the need for algorithms which are energy efficient as well as
operating with limited processing and memory resources.
Limited Bandwidth: Wireless link are known to have significantly lower capacity than infrastructure networks. In addition the
efficiency of wireless communication medium have been found to be less when compared to wired medium due to the effect of
multiple access, fading, noise, interference conditions, etc.
Availability: The term Availability means that a node should maintain its ability to provide all the designed services regardless
of its security state (Mishra and Nadkarni, 2003). This criterion ensures that the node maintains its ability to provide all the
designed services irrespective of the network operational status and the security measures adopted. It ensures the survivability
of the network services despite denial of service attack.
Authentication: It ascertains the credibility of the network user. This ensures that participants in the network are genuine and
they are not impersonators or imposters. Singh and Dhiman 2013, states that if there is no such authentication mechanism, the
attacker could act as a benign node and thus get access to confidential information or even insert some false messages to
disturb the normal network operations.
Uniqeness: This requirement ensures that malicious nodes do not resend previously captured data packets.
Confidentiality: Confidentiality means that certain information is only accessible to those who have been authorized to access
it (Li and Joshi, 2008). It ensures vital information must be kept away from unauthorized users. According to Goyal et al, 2011,
in order to maintain the confidentiality of some vital information, there is need to keep them secret from all entities that are not
authorized and acknowledged to access them.
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 722
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Integrity: Integrity guarantees the identity of the messages when they are transmitted. It ensures that data packets being
transferred without are not corrupt. It also asserts that data are modified by authorized parties or in authorized way (Aarti and
Tyagi, 2013).
Non-repudiation: It ensures the sender and receiver of the message cannot deny that they sent and received the massage
(Gary and Mahapatra, 2009).
The passive attacks are forms of attack which are difficult to identity. They do not disrupt the operation of the network but
monitors its operation and violates the confidentiality criteria of the network. Examples include eavesdropping, traffic analysis.
The active attacks cause serious effects on the network operations. They are attacks that bear some energy cost in order to
perform the attacks. In this form of attack, the intruder performs effective violation on either the network resources or data
transmitted or both. Example is denial of service attack.
The various forms of attack on MANET and some possible counter measures include the following:
Impersonation: It is a severe threat to MANET security. This form of attack allows the compromised node to join the
network and perform malicious behavior like propagate fake data packets, alter the transmission of good/normal data
packet. A good authentication measure can serve as an effective means for overcoming this form of attack.
Routing Table Corruption: In this type of attack, the malicious node generates fake routing table or alters the
configuration of the legitimate routing table or modify legitimate message from other nodes in order to add fake entire to
the routing table. This attack can have non-optial routers, bottlenecks and even cause partitioning of certain parts of the
network.
Denial of Service: DoS attacks are aimed to complete disruption of routing information. The attackers flood the network
with false routes and in addition disrupt the establishment of legal routes. Fellowship is a model based on obligation
proposed in the direction of alleviating the packet flooding and dropping of packet in the network. Limitation rate of
packets, restoration as well as enforcement are defined as the good constraints in this model (Balakrishnan et al, 2006).
Eavesdropping: It means to obtain some confidential information that should be kept secret during communication. These
information include public key, private key, location status, password of the nodes. Techniques of Frequency Hopping and
Spread Spectrum Communication can protect the nodes from eavesdropping by preventing radio interface as shown in
figure 2 (Hubaux et al, 2001).
Snooping: This is unauthorized access to another person’s node and includes the use of software program to remotely
monitor activity on a terminal device. Good routing information can protect the network against this attack.
Location Disclosure: It is a form of attack that targets the privacy requirement of a mobile Ad-hoc network.
Wormhole: It involves cooperation of two malicious nodes. A node ‘X’ captures routing traffic at one point of the network
to node ‘Y’. Node ‘Y’ then injects the tunneled traffic back to the network. This type of attack is dangerous because it can
cause damage to the network without any knowledge of such damage. According to Li and Joshi (2008), the use of packet
leash is a general mechanism for detecting and, thus defending against wormhole attacks. A leash is any information that is
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 723
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
added to a packet designed to restrict the packet’s maximum allowed transmission distance. There are two main leashes,
which are geographical leashes and temporal leashes. A geographical leash ensures that the recipient of the packet is
within a certain distance from the sender. A temporal leash ensures that the packet has an upper bound on its lifetime,
which restricts the maximum travel distance, since the packet can travel at most at the speed-of-light.
A geographical leash in conjunction with a signature scheme (a signature providing non repudiation), can be used to catch the
attackers that pretend to reside at multiple locations (see figure 3).
Black hole: In this attack, when a malicious node listen to a route request packet in the network, it responds with the claim
of having the shortest and the freshest route to the destination node even itf no such route exists. As a result the malicious
node easily misroute network traffic to it and then drop the packets transitory to it as depicted in figure 4 (Raja and Baboo,
2014). Khan and Islam (2012), presented a way to secure MANET against this form of attack. This can be achieved by using
encryption and node location information. However, key distribution is a challenge in MANET.
Gray Hole Attack: It is a form of route misbehavior attack which leads to dropping of messages.
Malicious Code Attack: This is a type of virus attack which include; worms, spywares, Trojan horses which can attack
both operating system and use application at the network terminal. A reliable anti-virus and other utility software
applications can serve as good solution against these attacks.
Flooding Attack: In this type of attack, the attacker exhausts the network resources such as bandwidth, battery power or
disrupt the routing operation which causes degradation in network performance.
Traffic Monitoring and Analysis: This type of attack involves the use of software to monitor the direction and frequency
of traffic flow. Network topology, node location, mode of operation of the node, source and destination of data packets are
some of the information this form of attack can expose. Monika and Rahul (2010) proposed that traffic analysis can be
avoided by supporting link layer security and securing wireless MAC protocol.
Selfishness (Selfish Node Misbehavior): Uncooperative act of node but distinct for evil behavior is referred to as selfish
misbehavior. Such evil node makes use of the network resources only for selfish benefit and reject or refuse to send data
packet from other nodes. They take unnecessary advantage of other nodes but do not allow their resources to be used.
TWOACK is a very efficient scheme. It identifies the uncooperative behavior of nodes and explores to mitigate the cause
through telling routing protocol (Kashyap et al, 2005).
Jamming: In this form of attack, the attacker transmits data packet at the same speed/frequency with same two
communicating nodes. This leads to conflict in the transmission link, between the two communicating parties. Regular
forms of data packet (signed) jamming are random noise and pulse.
Spread Spectrum Mechanism to block denial-of-service attacks could be a good solution.
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 724
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Node Isolation Attack: In this attack, the communicating nodes are isolated by not spreading communication
link/medium to some particular collection of nodes or a node in the network. This keeps these set of nodes away from
others in the network hence routing is not possible to these nodes (Kannhavong et al, 2006).
This proposed counter measure is Intrusion Detection System (IDS), a local module of intrusion detection for OLSR. This
module does non-conformance evaluation of each node in network and reveals the existence of attack on routing protocol.
Rushing attack: In rushing attack, the compromised node receives a route request from the source node, it quickly floods
the packet to other nodes in the network before the other node receive the some packet from the main source. This cause
the other nodes upon the acknowledgment of the packet from the legal source, they will discard/reject it (see figure 5).
This attack can be overcome via a set of generic mechanisms that together defend against the rushing attack. These include
Secure Neighbor Detection, Secure Route Delegation, and Randomized Route Request Forwarding (Li and Joshi, 2008). The
relations among these security mechanisms are shown in figure 6.
Figure6: Combined Mechanisms to Secure MANET against Rushing Attacks (Li and Joshi, 2008)
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 725
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
[6] Helen, D. and Arivazhagan, D. (2014), Application, [12] Li, W. and Joshi, A. (2008), Security Issues in Mobile Ad
Advantages and Challenges of Ad hoc Network, Journal Hoc Network - A Survey,
of Academic and Industrial Research. Vol. 2, Issue 8, pp. www.researchgate.net/publication/266280897.
453 – 457.
[13] Mishra, A. and Nadkarni, K. M. (2003), Security in
[7] Hubaux, J. P., Buttyan, L. and Capkun, S. (2001), The Wireless Ad Hoc Networks, The Handbook of Ad Hoc
Quest for Security in Mobile Ad Hoc Networks, ACM Wireless Networks (Chapter 30), CRC Press LLC, NY.
Symposium on Mobile Ad hoc Networking and
[14] Monika, M. K. and Rahul, R. (2010), Security Aspects in
Computing.
Mobile Ad Hoc Network (MANETs): Technical Review,
[8] Kannhavong, B., Nakayama, H., Kata N., Nemoto, Y. and International Journal of Computer Applications, Vol. 12,
Jimalipoor, A. (2006), Analysis of the Node Isolation No.2.
Attack against OLSR Based Mobile Ad hoc Networking,
[15] Nithya, S, Prema, S. and Sindho, G. (2016), Security
Proceedings of the Seventh IEEE International
Issues and Challenges: Attributes In Mobile Ad hoc
Symposium on Computer Networks (ISCN 06), pp. 30 -
Networks, International Research Journal of
35.
Engineering and Technology (IRJET), Vol. 3, Issue 01,
[9] Kashyap Balakrishnan, Jing Deng, and Pramod K. pp. 1083-1087.
Varshney, (2005), TWOACK: Preventing Selfishness in
[16] Raja, L. and Babao, B. (2014), An Overview of MANET:
Mobile Ad Hoc Networks, IEEE Conference on Ad Hoc
Application, Attacks and Challenges, International
Networks, 2005.
Journal of Computer Science and Mobile Computing,
[10] Khan, Z. A. and Islam, M. H. (2012), Wormhole Attack: A Vol. 3, Issue 1, pp. 408-417.
New Detection Technique, International Conference on
[17] Singh, J. and Dhiman, N. (2013), A Review Paper on
Emerging Technologies (ICET).
Introduction to Mobile Ad hoc Network, International
[11] Kopekor, S. and Kumer, A. (2015), A Study of Ad hoc Journal of Latest Trends on Engineering and
Wireless Network: Various Issues in Architecture and Technology (IJLTET), Vol. 2, Issue 4, pp. 143-149.
Protocols, International Journal of Computer
Applications, Vol. 12, No. 6, pp. 36 - 40.
@ IJTSRD | Unique Paper ID – IJTSRD30107 | Volume – 4 | Issue – 2 | January-February 2020 Page 726