Security Threats In Mobile Ad Hoc Networks

  • 23149 Words
  • 102 Pages
  • Report
Read Complete Research Material



Security Threats in Mobile Ad Hoc Networks

ACKNOWLEDGMENT

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible

DECLARATION

I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University

Signed __________________ Date _________________

ABSTRACT

The Mobile Ad Hoc Network is one of the wireless networks that have attracted the attention of computing professionals, as well as researchers. A Mobile Ad Hoc Network (MANET) can be defined as a system that consists of wireless mobile nodes. The wireless nodes are organized in an arbitraries and topologies. The networks allow individuals to connect without a communication infrastructure. In MANET, nodes can be connected directly with other nodes within radio ranges.Ad hoc networks are referred to as a group of mobile wireless nodes that come together to form an impermanent network without the aid of any centralized monitoring or administrator. It is difficult to maintain the security of Mobile Ad Hoc Networks because of the vulnerabilities associated with these networks. The vulnerabilities of Ad Hoc Mobile Networks are more than those of wired networks. This paper involves a discussion of the security issues and possible solutions in the mobile ad hoc network. The important characteristics of Mobile Ad Hoc Networks (MANET) include self-organisation and wireless medium. This study focuses on finding the differenty types of security threats in mobile ad hoc networks.

Table of Contents

ACKNOWLEDGMENTII

DECLARATIONIII

ABSTRACTIV

CHAPTER 1: INTRODUCTION1

Summary of the Chapter1

Background of the Study1

Aim of the project2

Objectives of the Project2

Legal and Ethical Concerns3

Legal Concern3

Intellectual Property3

Use of Project Documentation3

Development tool /Devices Used3

Ethical Concern4

Public4

Employer and Client4

Product5

Judgement5

Management5

Risk Management5

Thesis Structure6

CHAPTER 2: LITERATURE REVIEW7

Summary of the Previous Chapter7

Literature Review7

Features of Mobile Ad Hoc Network8

Vulnerabilities of the Mobile Ad Hoc Networks9

Lack of Secure Boundaries9

Threats from Compromised Nodes inside the Network10

Lack of Centralised Management Facility10

Restricted Power Supply11

Scalability11

Security Problems in MANET12

Data Corruption12

Session Hijacking12

Black Hole13

Location Disclosure13

Eavesdropping13

Byzantine Attack14

Types of Attacks in Mobile Ad Hoc Networks14

External Attacks14

Internal Attacks14

Denial of Service (DoS)15

Impersonation15

Eavesdropping16

Attacks against Routing16

Security Goals in MANET16

Availability17

Confidentiality17

Integrity17

Authentication17

Security Schemes in the Mobile Ad Hoc Networks18

Intrusion Detection Technique18

Cluster-based Intrusion Detection Technique for Ad Hoc Networks19

Projected Solutions to MANET Security Problems21

CHAPTER 3 : MANET22

Summary of the Previous Chapter22

Detailed discussion of MANET features22

Device Compatibility22

Connectivity23

Routing23

Mobility26

Bandwidth usage26

Survivability27

Security27

Real-world components of a mobile adhoc network29

Network Access Control31

Trace back31

Power Efficiency of the MANETs Security Framework33

Data Link Layer34

Network Layer38

Transport Layer41

Application Layer42

Attack Mitigations46

CHAPTER 4: METHODOLOGY52

Summary of the Previous Chapter52

Research Method52

Mixed Method Research53

Classification of Research Methods53

Multi-Method Studies54

Mixed Method Studies54

Steps in Mixed Methodology54

Strength and weakness of the mixed research:55

Strengths55

Weaknesses56

Research Design57

Rationale for Methodology57

Secondary Data57

Quantitative and Qualitative Data58

Connecting the Data59

Data Collection Method59

Questionnaire59

Data Collection Instrument60

Implementation of Secure Security Procedures60

Sampling Method61

Sample Selection61

Literature Search61

Ethical Consideration61

Credibility62

Reliability and Validity63

CHAPTER 5: FINDINGS AND ANALYSIS65

Summary of the Previous Chapter65

Linking Analysis with Literature Review72

CHAPTER 6 : RECOMMENDATION AND EVALUATION74

Summary of the Previous Chapter74

Evaluation Strategy74

Recommendations75

Network model and security assumptions77

Attack model78

CHAPTER 7: CONCLUSION AND FUTURE WORK80

Summary of the Previous Chapter80

Dissertation Summary80

Research Summary81

Security ...
Related Ads