MANET Security Appraisal: Challenges, Essentials, Attacks, Countermeasures & Future Directions
Rashidah F. Olanrewaju1, Burhan U Islam Khan2, Farhat Anwar3, Bisma Rasool Pampori4, Roohie Naaz Mir5
1Burhan Ul Islam Khan*, Department of Elec. & Comp. Engin, Kulliyyah of Engineering, IIUM Malaysia.
2Rashidah F. Olanrewaju, Department of Elec. & Comp. Engin, Kulliyyah of Engineering, IIUM Malaysia.
3Farhat Anwar, Department of Elec. & Comp. Engin, Kulliyyah of Engineering, IIUM Malaysia.
4Bisma Rasool Pampori, Department of IT, CUK, Srinagar, Kashmir.
5Roohie Naaz Mir, Department of CSE, NIT, Srinagar, Kashmir.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 3013-3024 | Volume-8 Issue-6, March 2020. | Retrieval Number: E6537018520/2020©BEIESP | DOI: 10.35940/ijrte.E6537.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Currently, Mobile Ad hoc Networks (MANETs) have evolved as one of the essential next-generation wireless network technologies. MANET comprises of mobile nodes that are self-configurable, and every mobile node behaves as a router for every other node allowing data to move by making use of multi-hop network routes. MANETs signify a networking class that is crucial and differs from conventional systems. Although MANETs are being popularly employed in commercial as well as academic fields, these were primarily designed for deployment in areas like military battlefields, emergency rescue and search operations, and other challenging or hostile environments. The distributed and wireless nature of MANETs paves the way for intruders to reduce MANET functionalities. MANET are susceptible to various attack at different layers since the majority of MANET routing protocols are designed with the assumption that no malicious intruder is present in the network. Therefore, recognizing those threats and finding solutions for their mitigation become essential. This study analyses various security attributes, challenges, attacks on multiple layers and countermeasures for thwarting attacks in MANETs.
Keywords: Intrusion Detection System, MANET Security, Secure MANET Routing, MANET Security Attacks.
Scope of the Article: Community Information Systems.