Share This Article:

A Survey of MANET Survivability Routing Techniques

Abstract Full-Text HTML XML Download Download as PDF (Size:121KB) PP. 176-185
DOI: 10.4236/ijcns.2013.64021    4,067 Downloads   6,591 Views   Citations

ABSTRACT

Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support Mobile Ad hoc Network (MANET) survivability in adversarial environment. Survivable of routing operations is the key aspects of the challenge in MANETs because most of destructive attacks classified as active attacks and all are intent to attack MANET routing operation to prevent it from providing it services in a right time. In this paper, we will discuss the most effective and practical initiatives have designed to keep MANET survive in an adversarial environment and how it supporting MANET availability.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

M. Ahmed, A. Abdullah and A. El-Sayed, "A Survey of MANET Survivability Routing Techniques," International Journal of Communications, Network and System Sciences, Vol. 6 No. 4, 2013, pp. 176-185. doi: 10.4236/ijcns.2013.64021.

References

[1] A. K. Rai, R. R. Tewari and S. K. Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication,” International Journal of Computer Science and Security, Vol. 4, No. 3, 2010, pp. 265-274.
[2] H. L. Nguyen and U. T. Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks,” Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 23-29 April 2006, 149 p.
[3] B. Wu, J. M. Chen, J. Wu and M. Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, Berlin, 2007, pp. 103-135.
[4] V. Gokhale, S. K. Ghosh, et al., “Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks,” Security of Self-Organizing Networks, Auerbach Publications: MANET, WSN, WMN, VANET, 2010, p. 195.
[5] Y.-C. Hu and A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Security & Privacy, Vol. 2, No. 3, 2004, pp. 28-39. doi:10.1109/MSP.2004.1
[6] K. Paul, R. R. Choudhuri and S. Bandyopadhyay, “Survivability Analysis of Ad Hoc Wireless Network Architecture,” Mobile and Wireless Communications Networks, Springer, Berlin, pp. 31-46.
[7] M. N. Lima, A. L. dos Santos and G. Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, 2009, pp. 66-77.
[8] Z. Yanjun, “A Framework of Survivability Requirement Specification for Critical Information Systems,” 43rd Hawaii International Conference on System Sciences, Piscataway, 2010.
[9] M. N. Lima, H. W. da Silva, et al., “Requirements for Survivable Routing in MANETs,” 3rd International Symposium on Wireless Pervasive Computing, 7-9 May 2008, pp. 441-445. doi:10.1109/ ISWPC.2008.4556246
[10] Y.-C. Hu, A. Perrig and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, Vol. 11, No. 1-2, 2005, pp. 21-38. doi:10.1007/s11276-004-4744-y
[11] A. A. Cardenas and N. Benammar, G. Papageorgiou and J. S. Baras, “Cross-Layered Security Analysis of Wireless Ad Hoc Networks,” DTIC Document.
[12] A. K. Jain and V. Tokekar, “Classification of Denial of Service Attacks in Mobile Ad Hoc Networks,” International Conference on Computational Intelligence and Communication Networks, Gwalior, 7-9 October 2011, pp. 256-261. doi:10.1109/CICN.2011.51
[13] R. C. Linger, N. R. Mead, et al., “Requirements Definition for Survivable Network Systems,” Proceedings of the 3rd International Conference on Requirements Engineering, Washington DC, 1998, pp. 14-23.
[14] R. Ramanujan, S. Kudige and T. Nguyen, “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (Tiara),” DARPA Information Survivability Conference and Exposition IEEE Computer Society, Los Alamitos, 2003, pp. 98-100.
[15] B. Awerbuch, R. Curtmola, et al., “On the Survivability of Routing Protocols in Ad Hoc Wireless Networks,” 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, 5-9 September 2005, pp. 327-338.
[16] S. Dabideen, B. R. Smith and J. J. Garcia-Luna-Aceves, “An End-to-End Solution for Secure and Survivable Routing in MANETs,” 7th International Workshop on Design of Reliable Communication Networks, Washington DC, 25-28 October 2009, PP. 183-190.
[17] R. H. Jhaveri, S. J. Patel, et al., “DoS Attacks in Mobile Ad Hoc Networks: A Survey,” 2nd International Conference on Advanced Computing & Communication Technologies, 2012.
[18] B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” ACM Workshop on Wireless Security, 2002.
[19] D.-Y. Qin, L. Ma, X.-J. Sha and Y.-B. Xu, “An Effective Survivable Routing Strategy for MANET,” Tamkang Journal of Science and Engineering, Vol. 14, No. 1, 2011, pp. 71-80.
[20] M. N. Lima, H. W. da Silva, et al., “Survival Multipath Routing for MANETs,” IEEE of Network Operations and Management Symposium, Salvador, 7-11 April 2008, pp. 425-432. doi:10.1109/NOMS.2008.4575164
[21] E. Y. Hua and Z. J. Haas, “Path Selection Algorithms in Homogeneous Mobile Ad Hoc Networks,” Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, New York, 2006, pp. 275-280.
[22] Y.-C. Hu, A. Perrig, et al., “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2nd ACM Workshop on Wireless Security, San Diego, 2003, pp. 30-40.
[23] A. S. Al Shahrani, “Rushing Attack in Mobile Ad Hoc Networks,” 3rd International Conference on Intelligent Networking and Collaborative Systems, Fukuoka, 30 November-2 December 2011, pp. 752-758. doi:10.1109/INCoS.2011.145
[24] N. A. Boudriga and M. S. Obaidat, “Fault and Intrusion Tolerance in Wireless Ad Hoc Networks,” IEEE of Wireless Communications and Networking Conference, Vol. 4, 2005, pp. 2281-2286. doi:10.1109/WCNC.2005.1424871
[25] P. Geng and C. Zou, “Routing Attacks and Solutions in Mobile Ad hoc Networks,” International Conference on Communication Technology, Guilin, 27-30 November 2006, pp. 1-4.
[26] Y. Xue and K. Nahrstedt, “Providing Fault-Tolerant Ad Hoc Routing Service in Adversarial Environments,” Wireless Personal Communications: An International Journal, Vol. 29, No. 3-4, 2004, pp. 367-388. doi:10.1023/B:WIRE.0000047071.75971.cd

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.